Shaarli export of all bookmarks on Mon, 18 Jun 18 07:32:22 -0400
- Identifying & Resolving Excessive CPU Overcommitment (vCPU:pCore ratios) | CloudXC
- Linux, BSD, and everything else...: Nomadic Working with NomadBSD 1.0.1 - BSD on a stick
- Decision-Making in Self-Management Organizations Using Systemic Consensus -
- How to generate a UML diagram using Powershell And GraphViz -
- Industries Most and Least Likely to Be Disrupted in 2018 | APMdigest - Application Performance Management
- Installing macOS Mojave 10.14 Developer Beta on Proxmox 5.2 – Nicholas Sherlock
- Python Lambda script for Cleaning Up unused Amazon EC2 instances | geekdudes
- Database Migration Guide – June 2018 updates – Microsoft Data Migration Blog
- Windows Incident Response: Coding in DFIR
- Probequest - Toolkit For Playing With Wi-Fi Probe Requests - KitPloit - PenTest Tools for your Security Arsenal ☣
- My Tactical Advice for Clearing Depression - Daniel Miessler
- Chris's Wiki :: blog/linux/LinuxBootOverview
- Cloud Storage, File Sharing Apps and GDPR: This Could Get Ugly Fast! - Security Boulevard
- Can Security be a Business Enabler? – ShiftLeft Blog
- A language to speak Dev[Sec]Ops – ShiftLeft Blog
- Here are the 2 biggest IT priorities for boards of directors - TechRepublic
- To keep pace with digital transformation, boards of directors at many companies are prioritizing cybersecurity skills, and operational risk and compliance.
The tech talent shortage is one major barrier to digital transformation success, with security and analytics skills in high demand.
- Don't Rely on Long Support Lifecycles · Lindsay Hill
- The Zero Trust Model Provides a More Proactive Approach to Security
- Group Fines Under the GDPR – Threat Stack
- AWS Security Monitoring Checklist - Security Boulevard
- Making Sense of Tomorrow’s Cybersecurity Trends
- A Totally Tubular Treatise on TRITON and TriStation « A Totally Tubular Treatise on TRITON and TriStation | FireEye Inc
- Introducing Gaum: An Open Source O/RM That isn’t an O/RM
- How Ransomware Is Changing Cybersecurity and What To Do About It - Security Boulevard
- Cybersecurity & Customer Experience: Embrace Technology and Change To Earn A Customer’s Loyalty | Radware Blog
- Cybersecurity & Customer Experience: Embrace Technology and Change To Earn A Customer’s Loyalty - Security Boulevard
- What is AWS PCI Compliance? – Threat Stack
- What Systems Keep You Effective? - Security Boulevard
- CISOs Have an Opportunity to Shine as Regulations Enforce Change, Gartner Says
- PCI DSS 3.2.1 FAQs - Security Boulevard
- Cybersecurity: Protecting All the Endpoints
- Automated SQL Injection Testing of Serverless Functions On a Shoestring Budget (and Some Good Music) - Security Boulevard
- Monitoring Data & Data Access to Support Ongoing GDPR Compliance – Part III: Tools - Security Boulevard
- Healthcare: Security in Crisis? - Social-Engineer.Com - Professional Social Engineering Training and Services
- How to Secure Public Cloud and DevOps? Get Unified Visibility. - Blog | Tenable™
- Cyber security - How Threat Hunters Operate in Modern Security EnvironmentsSecurity Affairs
- ICS/SCADA Smart Scanning: Discover and Assess IT-Based Systems in Converged IT/OT Environments - Blog | Tenable™
- Monitoring VPN Logins & Incorporating them to AD - Syspanda
- CISSP CAT Exam Deep Dive: Study Tips from InfoSec Institute Alum Joe Wauson
- Cyber Defense e-Magazines – Cyber Defense Magazine
- Cybersecurity Framework | NIST
- Updated 1.1
- Highlights from Verizon DBIR 2018 - Security Boulevard
- Identity Governance and Administration (IGA) in IT Infrastructure of Today - Security Boulevard
- GitHub - WaterByWind/edgeos-bl-mgmt: Automated updating of EdgeOS firewall network-group to be used as source address blacklist
- NBlog - the NoticeBored blog: NBlog June 14 - metrics maturity metric, mmm
- Are your Android apps sending unencrypted data? – Naked Security
- Back to Basics: Building a Foundation for Cyber Integrity - basics-building-foundation-cyber-integrity-38455
- NBlog - the NoticeBored blog: NBlog June 5 - security frameworks
- NBlog - the NoticeBored blog: NBlog June 12 - infosec priorities
- Florida leads list of states with worst cyber hygiene, New Hampshire the safest
- How to become a Linux security expert? - Linux Audit
- Bad .Men at .Work. Please Don’t .Click — Krebs on Security
- Cybersecurity Reference Architecture: Security for a Hybrid Enterprise – Microsoft Secure
- Updating your cybersecurity strategy to enable and accelerate digital transformation – Microsoft Secure
- Building Zero Trust networks with Microsoft 365 – Microsoft Secure
- The Spamhaus Project - The Top 10 Most Abused TLDs
- RDP logs and incident response - Koen Van Impe - vanimpe.eu
- DARKSURGEON - A Windows Packer Project To Empower Incident Response, Digital Forensics, Malware Analysis, And Network Defense - KitPloit - PenTest Tools for your Security Arsenal ☣
- DejaVU - Open Source Deception Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
- Why incident response planning is critical for your organisation – IT Governance Blog
- Only 24% of organisations consistency apply incident response plans – IT Governance Blog
- Wifite 2.1.0 - Automated Wireless Attack Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- Namechk - Osint Tool Based On Namechk.Com For Checking Usernames On More Than 100 Websites, Forums And Social Networks - KitPloit - PenTest Tools for your Security Arsenal ☣
- Omnibus - Open Source Intelligence Collection, Research, And Artifact Management - KitPloit - PenTest Tools for your Security Arsenal ☣
- Omnibus
- Rastrea2R - Collecting & Hunting For IOCs With Gusto And Style - KitPloit - PenTest Tools for your Security Arsenal ☣
- Rastrea2r
- Requirements of a DPO in health and social care – IT Governance Blog
- Organisations must invest more in incident response planning – IT Governance Blog
- 5 ways to become a successful distance learning student – IT Governance Blog
- 4 tips for incident response management success – IT Governance Blog
- What are the Data Subject Rights under the GDPR? – IT Governance Blog
- GDPR: lawful bases for processing, with examples – IT Governance Blog
- JPCERT/CC Blog: How to Describe Vulnerability Information?
- Drone Forensics Gets a Boost With New Data on NIST Website | NIST
- Infosecurity.US - Web Log - The First Cyberattack
- The 3 Must Knows of Sandboxing
- Building a Strong, Intentional and Sustainable Security Culture
- 4 Cybersecurity Tips for Staying Safe During the World Cup
- Implementing appropriate security under the GDPR
- How to Protect Your DNS Privacy on Ubuntu 18.04 with DNS over TLS
- How not to write your GDPR-'compliant' data protection notice
- One-third of healthcare CIOs 'still on the journey' to comply with GDPR privacy rules
- Security Ratings Answer Big Questions in Cyber ...
- Understanding data processors’ ISO and SOC 2 credentials for GDPR compliance
- ISO explained
- Facebook, Google Targeted Among 19 Pan-EU Privacy Complaints - Bloomberg
- Bash tips for everyday at the command line | Opensource.com
- A complete 5G standard is finally here
- 15 Best Security Podcasts For You
- Should the FDA Create a Cybersecurity Measuring Stick?
- Linux Privilege Escalation using LD_Preload
- Evil Tester: Notes on Shift Left in Testing and Software Development
- The L0pht Legacy - The Ethical Hacker Network
- Medical Device Cyber Vulnerabilities: More Alerts
- How to Use the NIST Cybersecurity Framework - HealthcareInfoSecurity
- Congress Considers Ways to Beef Up Healthcare Cybersecurity
- Erik Decker
- The best free cultural & educational media on the web | Open Culture
- Read This Before Signing Up for a Programming or Coding Course!
- Using PowerShell to report on thousands of Microsoft SQL Instances & Databases – Virtually Sober
- These 10 Security Experts Are Making Your Life More Secure
- Neat Odroid & GlusterFS Build Stashes Data, Sips Power | Hackaday
- StarWind Free Virtual Tape Library (VTL) | ESX Virtualization
- Meet 'Bro': The Best-Kept Secret of Network Security
- 15 Octave Commands Every Data Scientist Must Know - Big Data Beard
- Security metrics you need for the board | CSO Online
- Ubunsys - An Advanced System Configuration Utility For Ubuntu Power Users - OSTechNix
- Welcome to NTPsec
- Open Social Security: Free, Open-Source Social Security Calculator
- The GDPR initiative and how it affects US government and industry | CSO Online
- Modern Cybersecurity Demands a Different Corporate ...
- Security and Privacy Are Not As Different As People Think - Daniel Miessler
- Managed Service Providers vs In-House IT Administrators
- How to Configure ESXi Unattended Installations: Part 2
- What is the New York Cybersecurity Regulation? What you need to do to comply | CSO Online
- Generating a docs website powered by Git & Markdown – Karim Vaes
- NSE Scripts – More Than Scanning | CQURE Academy
- Difference Between Multi-Factor Authentication and Multi-Step Authentication | Alexander's Blog
- Integrity and ethics in IT | The IT Skeptic
- ODROID-HC2 as an entry-level NAS | Logan Marchione
- The Life of Kenneth: Peering with Root DNS Servers
- PowerShell Practice Makes Perfect
- Look who's coming to Raspberry Fields 2018! - Raspberry Pi
- Build your own weather station with our new guide! - Raspberry Pi
- Synchronize your watches | Seth's Blog
- CrowPi: Raspberry Pi Experimenters Kit Review (With RTL-SDR and RPiTX Tests) - rtl-sdr.com
- Working with JSON data in PowerShell – Kory Thacher
- App Service Diagnostics – Profiling an ASP.NET Web App on Azure App Service | Azure App Service Team Blog
- DSC Resource Kit Release June 2018 | PowerShell Team Blog
- joeware – never stop exploring… :) » Blog Archive » Non-Expiring IDs Redux
- ITAR Compliance: Guidelines for Companies Dealing with USML
- NAT discussions, fact checking, and debate - The Forwarding Plane | The Forwarding Plane
- Network Labs Using Nested Virtualization in the Cloud | Open-Source Routing and Network Simulation
- Why Automation Matters : Lost Time | The ORACLE-BASE Blog
- IT decision makers limit cloud use due to difficulties with compliance
- New solution helps secure infrastructure across OT and IT environments
- Why Nonprofit Workplaces Are Stressful and What To Do About It | Beth's Blog
- What Is a Breadboard and How Does It Work? A Quick Crash Course
- Center for Humane Technology
- Chotto: A Little Japanese Word with 7 Different Meanings
- VMware's Accidental Containerization Hero
- Microsoft May 2018 Security Update CredSSP Issue
- ADB Exploit Leaves Thousands Of Android Devices Exposed To Attackers
- Microsoft and friends need to explain why always-connected PCs make sense
- ACPC
- Restaurant Style Pasta with Three Cheese Sauce Recipe -- Easy, Gluten Free, and Delicious | Penniless Parenting
- The four-percent rule for safe withdrawals during retirement
- 7 Tips for Issuing an Effective Press Release
- Windows Server 2019 What's New - Insider Preview Build 17666 | ESX Virtualization
- Want Your Child To Eat (Almost) Everything? There Is A Way : The Salt : NPR
- Using KSQL, Apache Kafka, a Raspberry Pi and a software defined radio to find the plane that wakes…
- XenServer PowerShell – New Windows VM from ISO | Ask the Architect
- Why You Should Use Windows Subsystem for Linux -- Virtualization Review
- Hacking When It Counts: The Magnetron Goes to War | Hackaday
- Understanding Cosmos DB | James Serra's Blog
- Bacula enterprise backup: Review - ITSMDaily.com
- A Better Way to Hire & Scale Your Team
- AMA: Do You Worry About Your Career? | Don Jones
- A third of IT professionals don't know how many endpoints they manage
- 71 percent of IT pros believe they can hack any organization
- DevOps Balanced Scorecard Dashboard | The IT Skeptic
- Top Five Ways to Optimize Performance Monitoring (by Keith Bromley)
- Is your network provider peered with Microsoft? - Tom Talks
- Office 365 Connectivity Guidance – On The Wire
- Gartner: Digital Workers Think Management is Out of Touch with Technology | APMdigest - Application Performance Management
- Cisco Stacking 2960-X Catalyst Switches | PeteNetLive
- The Future Isn’t In Databases, But In the Data - Thomas LaRock
- Advanced Standalone Kubelet tutorial for Raspberry Pi - Povilas Versockas
- How to find the Windows Experience Index in Windows 10 with Powershell – jasoncoltrin.com
- Deployment Research > Research
- ZPAQ
- GDPR: Continental bans WhatsApp & Snapchat | Born's Tech and Windows World
- In Memory Performance, Hyperconverged Simplicity – SAP HANA Validated on Nutanix AHV | Long White Virtual Clouds
- Chris's Wiki :: blog/unix/SbrkVersusMmap
- Lynis – Automated Security Auditing tool for Linux Servers
- Quick tip: Testing volume licensing activation by a KMS | >_
- A Quadruple-Provider Vagrant Environment - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
- Need Help with Oracle Security GDPR Training and Services
- Massive Delete | Oracle Scratchpad
- Exploring Kubernetes with Kubeadm, Part 1: Introduction - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
- Half-baked ideas: Server remote management with an RPi Zero | Richard WM Jones
- Slow network throughput between Ubiquiti EdgeRouter VLANs - IVOBEERENS.nl
- CCNA Training » CCNAv3 – New Questions Part 2
- RedEye Ransomware Destroys Your PC Files If Payment Isn't Made
- Azure Kubernetes Hackfest - Day 1 - Eric’s Azure Blog
- HDD and SSD Maintenance Checklist
- ESXi boot fatal error 33 inconsistent data | Adventures in a Virtual World
- Explaining your "Why" | Opensource.com
- Why You Need To Understand Your Software Supply Chain
- Read Ebooks Quicker With This Spritz-Like Fast Reading Command Line Software - Linux Uprising Blog
- How this media company became the first to broadcast entirely on Linux | Opensource.com
- Five Free Open Source Testing Tools You Can Trust | Information Security Buzz
- Standup report: June 8th, 2018 | Will's blog
- Homemade Cashew Based Hummus Recipe --- Paleo, Vegan, and Easy | Penniless Parenting
- Hummus Recipe
- Volume Shadow Copy Service: Overview and Troubleshooting
- SAP on AWS – Past, Present, and Future | AWS News Blog
- Amazon EKS – Now Generally Available | AWS News Blog
- FCC shrugs at fake cell towers around the White House
- Using MQTT to send and receive data for your next project | Opensource.com
- Citellus: Validate your deployments
- Creating a Wildfly cluster for load-balancing in Linux - LinuxTechLab
- How to Monitor Apache Performance using Netdata on CentOS 7
- Atlanta ransomware attack may cost another $9.5 million to fix
- Censorship in the Age of Large Cloud Providers - Lawfare
- How Apple Programmer Sal Soghoian Got Apps Talking to Each Other | WIRED
- How to Build an Amazon Echo with Raspberry Pi - Make Tech Easier
- Open Source Kata Project Improves Security With Virtualized Containers
- Data Privacy: Why It Matters and How to Protect Yourself | Linux Journal
- An Inside Look at OpenStack Security Efforts
- procinfo - Shows System Statistics from /proc Filesystem
- A Starter Collection of Blockchain Explainers | DennisKennedy.Blog
- The Fifth Anniversary of the Snowden Disclosures - Lawfare
- Make a $6 Tiny Portable Weather Station that Transmits Live Data Wherever You Are
- 18650 control boards
- How to dismantle a compiler bomb | Code Explainer
- The Importance of Using SIEM for GDPR Compliance - Security Boulevard
- CISSP Official Study Guide 8th Edition - What's new
- Think You’ve Got Your Credit Freezes Covered? Think Again. — Krebs on Security
- NCTUE
- Rethinking the “Lessons” of the First World War - Lawfare
- Working with Ansible and AWS EC2, SG, ASG and ELB tags - Alex Scoble's IT Notes - An Information Technology Blog
- NPM Fails Worldwide With "ERR! 418 I'm a Teapot" Error
- Announcing Federal Security and Compliance Controls for Docker Datacenter - Docker Blog
- You receive a "logon failure: unknown user name or bad" error message while accessing remote security-enhanced resources from an ASP.NET application
- TigerText now TigerConnect | Clinical Communication Solutions
- Products · NRS Systems
- Binmap: a system scanner
- How to: Login to your Microsoft Azure Subscription using Powershell «
- How big is the Microsoft Azure Cloud? «
- List all VM sizes in Microsoft Azure per Location «
- 3 Tools for Automating Deployments in the Era of the Modern Hybrid Cloud «
- VulnDB
- Why there are at least 6,000 vulnerabilities without CVE IDs | Synopsys
- Script to Reset WSUS for SysPrep’ed Image – Random Musings of Jeremy Jameson
- Adamj Clean-WSUS Powershell Script : sysadmin
- Clean Up WSUS the Easy Way - Step by Step
- Script Reset WSUS Authorization and get new WSUS SID
- Script Reset Windows Update Agent
- GitHub - strongdm/comply: Compliance automation framework, focused on SOC2
- The State of ICS: One Year Into the Cyber Executive Order
- Security: Getting Off the Patch - The Shining Hope - Security Boulevard
- SecMon State of the Union: Refreshing Requirements - Security Boulevard
- Security: Getting Off the Patch - The Shining Hope
- Crashing HDDs by launching an attack with sonic and ultrasonic signalsSecurity Affairs
- The Ultimate Guide to CompTIA’s Security+ Certification - Security Boulevard
- The Security+ CBK Domains: Information And Updates - Security Boulevard
- GDPR Is Affecting the Way WHOIS Works, Security Researchers Worry
- What GDPR Compliance means to the IT Security Professional - Security Boulevard
- 50 Essential Cloud Security Blogs for IT Professionals and Cloud Enthusiasts – Threat Stack
- Home
- Developing GDPR compliant applications, Part 3: Minimizing application privacy risk
- Developing GDPR compliant applications, Part 2: Application privacy by design
- Developing GDPR compliant applications, Part 1: A developer’s guide to the GDPR
- Manage your fleet’s firewalls with osquery | Trail of Bits Blog
- Back to basics: What sysadmins must know about logging and monitoring | HPE
- The crooked timber of humanity | 1843
- Resetting Your Router the Paranoid (=Right) Way - Resetting Your Router the Paranoid (=Right) Way
- Binary analysis with Radare2 - Binary analysis with Radare2
- Radare2
- Attackintel - Tool To Query The MITRE ATT&CK API For Tactics, Techniques, Mitigations, & Detection Methods For Specific Threat Groups - KitPloit - PenTest Tools for your Security Arsenal ☣
- Prowler - Distributed Network Vulnerability Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- ReverseAPK - Quickly Analyze And Reverse Engineer Android Packages - KitPloit - PenTest Tools for your Security Arsenal ☣
- GitHub - trimstray/otseca: Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
- What goes in an incident response plan? – IT Governance Blog
- 5 tips to thwart medical device attacks | CSO Online
- Evil Tester: Google Advanced Searches - Google Dorks
- How to implement an ISMS aligned with ISO 27001 – IT Governance Blog
- PCI DSS compliance made easier – IT Governance Blog
- How to Prevent Cloud Configuration Errors
- Sysadmin Stories: PowerCLI - Get the sizing of virtual machines
- I/O Analyzer
- 13 tools for checking the security risk of open-source dependencies
- Librarians, Meet Your Motherboard » Public Libraries Online
- Ready, Set, Negotiate! Preparing for Successful Contract Talks » Public Libraries Online
- Observation, Orientation, Decision, Action Applying the OODA Loop Concept to Libraries » Public Libraries Online
- Teaching Technology » Public Libraries Online
- Windows Server 2012 R2 – Uninstalling .Net Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.71 – the Connector Space
- Using the server_stats command on Celerra / VNX File - THE SAN GUY
- Gathering performance data on a virtual windows server - THE SAN GUY
- Scripting automatic reports for Isilon from the CLI - THE SAN GUY
- Meet Aptomi: An application delivery engine for Kubernetes - Superuser
- Isilon Port Usage - THE SAN GUY
- Default Passwords - THE SAN GUY
- Minikube: Try Kubernetes on Windows without headaches – Marksei
- Spanning The Tree : Dr Radia Perlman & Untangling Networks | Hackaday
- ESXi CLIativity – Part 1 | Adventures in a Virtual World
- An inside look at Google’s hiring and onboarding processes
- How to Configure ESXi Unattended Installations: Part 1
- Counting Bees With A Raspberry Pi | Hackaday
- Red Hat's only business plan is to keep changing plans | ZDNet
- Effects of Bring Your Own Device (BYOD) On Cyber Security
- Amazon Web Services Networking Overview « ipSpace.net by @ioshints
- dbKoda | dbKoda is the open-source, next generation IDE for MongoDB. Take your database to the next level with our Rich Code Editor, Multiple Connection Management and Topology Tree Explorer.
- Systematic MongoDB performance tuning – dbKoda – Medium
- Introducing SQL Server on Kubernetes - Blog dbi services
- Semi-Automatic LaTeX: KDE’s Kile | OCS-Mag
- OpenStack Summit Vancouver: Automating the data centre | Ubuntu blog
- Kubernetes recipes: Maintenance and troubleshooting - O'Reilly Media
- BPFILTER Landing For Linux 4.18 For Eventually Better Firewall / Packet Filtering - Phoronix
- Paleo Vegan Tzatziki Recipe -- Mediterranean Yogurt Cucumber Sauce | Penniless Parenting
- What is zchunk?
- How to Monitor Your Linux Servers Performance with Glances Tool
- Red Hat Summit: Building production-ready containers - RHD Blog
- 10 7zip (File Archive) Command Examples in Linux
- Notes On Installing CentOS 7 Server – levlaz
- Hewlett Packard Enterprise Grows Compute Business as Private Cloud Opportunities Advance
- Microsoft OneDrive for Business Review: Pros and Cons
- Building an 90° angular power adapter for the C64 | 0xf8.org
- "How much house can I afford?"
- Top 5 Consumer Tips for Your Credit Report - Law and Daily Life
- Can an Employer Check Your Credit Score? - Law and Daily Life
- Nutanix Resiliency – Part 2 – Converting from RF2 to RF3 | CloudXC
- Nutanix Resiliency – Part 1 – Node failure rebuild performance | CloudXC
- Block Ads & Malvertising on pfSense Using pfBlockerNG (DNSBL) - Linux Included
- DNS is Changing. Are you Ready? - DNS is Changing. Are you Ready?
- Giving a Presentation? How to Impress Your C-Level Audience
- Diskover - File System Crawler, Storage Search Engine And Analytics Powered By Elasticsearch - KitPloit - PenTest Tools for your Security Arsenal ☣
- How InfoSec Institute Alum Rexson Serrao Earned the World’s Highest CGEIT Score
- List of data breaches and cyber attacks in May 2018 – 17,273,571 records leaked – IT Governance Blog
- Ten Best Practices for Outsmarting Ransomware
- Sia Load Test Wrap-up | Space Duck
- Abusing IVR Systems - Legacy Telecom [CVE-2018-11518]Security Affairs
- Fortinet Threat Report Reveals an Evolution of Malware to Exploit Cryptocurrencies
- “Free” Memory Sticks can be Expensive
- Troy Hunt: Pwned Passwords in Practice: Real World Examples of Blocking the Worst Passwords
- USING POWERSHELL TO BACKUP SQLSERVER DATABASES
- Don’t Be GDPR Complacent, It’s Time to Get Compliant - Security Boulevard
- Does your organisation rely too heavily on technology? – IT Governance Blog
- What does a ransomware attack cost? Beware the hidden expenses | CSO Online
- A Gorgeous Guide to the First Wave of Personal Computers - Motherboard
- Collect NTFS forensic information with osquery - Security Boulevard
- Pathways to an Enterprise Security Architecture (ESA) | Security Architects Partners
- NBlog - the NoticeBored blog: NBlog May 11 - mind remapped
- NBlog - the NoticeBored blog: NBlog May 19 - PRAGMATIC security metrics
- NBlog - the NoticeBored blog: NBlog May 25 - GDPR day
- Back to Basics: Focus on the First Six CIS Critical Security Controls - basics-focus-first-cis-critical-security-controls-38395
- 10 Endpoint Security Problems Solved by the Cloud - 10-endpoint-security-problems-solved-cloud-38415
- The Untold Story of Japan’s Secret Spy Agency
- Completing the vSphere vCenter Appliance Hardening Process | slice2
- HOWTO quickly STIG Firefox 59.01 | slice2
- ESXi Compatibility Checker
- GDPR Hall of Shame
- Cybersecurity salaries highest in retail sector
- Securing the modern workplace with Microsoft 365 threat protection – part 4 – Microsoft Secure
- Securing the modern workplace with Microsoft 365 threat protection – part 3 – Microsoft Secure
- Securing the modern workplace with Microsoft 365 threat protection – part 2 – Microsoft Secure
- Securing the modern workplace with Microsoft 365 threat protection – part 1 – Microsoft Secure
- DHS Cybersecurity Strategy | Homeland Security
- Cyberattack map shows impacted U.S. school districts
- Fiber Cable | Nbctcp's Weblog
- Metta - An Information Security Preparedness Tool To Do Adversarial Simulation - KitPloit - PenTest Tools for your Security Arsenal ☣
- [LFCS] Commands to manage and configure containers in Linux – //Cloud notes from my desk
- Honeybits - A Simple Tool Designed To Enhance The Effectiveness Of Your Traps By Spreading Breadcrumbs & Honeytokens Across Your Systems - KitPloit - PenTest Tools for your Security Arsenal ☣
- FreeRADIUS Server Configuration Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- Samurai Email Discovery - Is A Email Discovery Framework That Grabs Emails Via Google Dork, Company Name, Or Domain Name - KitPloit - PenTest Tools for your Security Arsenal ☣
- Sandmap - A Tool Supporting Network And System Reconnaissance Using The Massive Nmap Engine - KitPloit - PenTest Tools for your Security Arsenal ☣
- Open Source Security Podcast
- Dumpzilla - Extract All Forensic Interesting Information Of Firefox, Iceweasel And Seamonkey Browsers - KitPloit - PenTest Tools for your Security Arsenal ☣
- Security and Human Behavior (SHB 2018) - Schneier on Security
- USB Reverse Engineering: Down the rabbit hole | /dev/alias – Hack. Dev. Transcend.
- GDPR compliance checklist for healthcare – IT Governance Blog
- Business Continuity Awareness Week (BCAW) – Free BCM resources – IT Governance Blog
- Galileo - Web Application Audit Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
- Archerysec - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities - KitPloit - PenTest Tools for your Security Arsenal ☣
- Salt-Scanner - Linux Vulnerability Scanner Based On Salt Open And Vulners Audit API - KitPloit - PenTest Tools for your Security Arsenal ☣
- Burpa - A Burp Suite Automation Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- Where does data flow mapping fit into your GDPR compliance project? – IT Governance Blog
- Two Ways To Be A Parent: Insights From The Author Of 'The Gardener And The Carpenter' : Goats and Soda : NPR
- Magic Mirror Tirelessly Indulges Children’s Curiousity | Hackaday
- Cyber security incidents are becoming more common and harder to resolve – IT Governance Blog
- CISO MindMap 2018 – What Do InfoSec Professionals Really Do?Rafeeq Rehman – Personal Blog
- Vulnerability Management: So Much More Than Just Patch Management
- Deployment Research > Research
- From Cambridge Analytica to GDPR: Enter digital supply chain management
- HITRUST Unveils Certification for NIST Cybersecurity Framework
- HITRUST releases NIST Cybersecurity Framework certification program
- Ask the DPO Web Conference Series
- The AWS Bucket List for Security
- SOC Automation: Good or Evil?
- The 13 Step Guide to Secure Your PC After a Fresh Windows Installation [Updated]
- Linux Privilege Escalation using Sudo Rights
- Healthcare Exchange Standards: Erasure Receipt
- Healthcare Exchange Standards: GDPR on FHIR
- Smashing Silos and Building Bridges in the ...
- US Government Cybersecurity at a Crossroads
- Hacking Articles - Raj Chandel's Blog
- The Modern Day Hacker – A Cautionary Tale - The Ethical Hacker Network
- 7 Tools for Stronger IoT Security, Visibility
- Get Ready for 'WannaCry 2.0'
- What Israel's Elite Defense Force Unit 8200 Can ...
- GDPR 101: Keeping Data Safe Throughout the 'Supply ...
- A Data Protection Officer's Guide to the Post-GDPR ...
- GDPR, WHOIS & the Impact on Merchant Risk Security ...
- Clint Boessen's Blog: 432 4.3.2 STOREDRV.Deliver recipient thread limit exceeded
- Pi serial adaptor | Facelesstech
- Harrowing Story of Installing Libreboot on ThinkPad | Hackaday
- Atari co-founder Ted Dabney dies
- List of Shark Tank Contestants
- 11 ways to hack 2FA | CSO Online
- Security Report Analysis: 2018 DBIR Report - Daniel Miessler
- What SSH Hacking Attempts Look Like – Doug Rickert – Medium
- Best certifications to get - The Silicon Underground
- LOADays
- OWASP DefectDojo Project - OWASP
- Linked - IBM bans all removable storage, for all staff, everywhere
- GDPR : The good, the good and the good! | The ORACLE-BASE Blog
- Computer security principles » Gofore
- Brendan Tierney - Oralytics Blog: Creating a Word Cloud using Python
- GitHub - rShetty/awesome-podcasts: Collection of awesome podcasts
- Decoding and Listening to HD Radio (NRSC-5) with an RTL-SDR - rtl-sdr.com
- YouTube Talk: Investigating RF Controls with RTL-SDR - rtl-sdr.com
- Naturebytes' weatherproof Pi and camera case - Raspberry Pi
- Continued: the answers to your questions for Eben Upton - Raspberry Pi
- PR-Holonet: Disaster Area Emergency Comms | Hackaday.io
- PR-Holonet
- Strengthening cybersecurity for the DoD – accelerating compliance – Azure Government Cloud
- Hey DBAs! Powershell is your friend! – Stefano Altamura’s Blog
- Windows Server Performance Tuning Guidelines – Brad Chen's SQL Server Blog
- Why GDPR is a $3.5 billion business opportunity – Microsoft Partner Network Blog
- How to set up a Virtualization Host using KVM on Ubuntu – Marksei
- How to Make Windows Speak the Time Out Loud Every Hour
- 5 Ways to Generate a List of All Installed Programs in Windows
- Windows Keyboard Shortcuts 101: The Ultimate Guide
- How to Keep Ethernet, TV, and Power Wires Tidy Using Cable Covers
- Making Sense of USB-C and Thunderbolt Cables and Ports on Your MacBook
- 10 Essential Vivaldi Browser Tips & Tricks for Speed and Productivity
- The Internet of (Medical) Things: Dangers, Risks, and Security Problems
- Why You Should Be Concerned About the EU's New CPC Law
- DNS Propagation Checker - ViewDNS.info
- Why modernize your datacenter if you are cloud first? | Virtual Me
- Passing the AWS Certified Developer – Associate Exam #AWS @acloudguru @AWS @AWS_UKI #vExpert @PSIServicesLLC – vMusketeers
- Everything You Need to Know About Raspberry Pi GPIO Pins
- The scientific methodology for troubleshooting SharePoint | SharePoint Dragons
- Auto-generated infrastructure node graphs from Terraform plans - Skelton Thatcher
- A Better Way of Visualizing Microservice Architecture
- A free e-learning tool for creating digital content | Opensource.com
- Chris's Wiki :: blog/linux/ReplacingNetstatNotBad
- 15 books for kids who (you want to) love Linux and open source | Opensource.com
- FOSS as a Part of a Corporate Sustainability Plan | Linux Journal
- Zammad - An Open Source Help Desk and Support Ticket System
- 8 Policy Changes to Improve Your Business’s Security
- GDPR Derogations, ePrivacy, and the Evolving European Privacy Landscape - Lawfare
- Sorting Through GDPR: What to Watch After May 25 - Lawfare
- BBC - Culture - The 100 stories that shaped the world
- Speculative Store Bypass: spectre for browsers, the nightmare isn't over yet – Marksei
- Is Training The Enemy of Progress? | The Networking Nerd
- Culture Shifts and Work Travel Learnings · Lindsay Hill
- Router on a Stick: Intro & Configuration (with lab files) - RouterFreak
- Rethinking motivation and engagement in the open organization | Opensource.com
- Journal of Azuma Hazuki (5086)
- Adding Value to Risk Management Activities With Open Source Tools
- Digitizing my DVDs
- DOTmed.com - Boston Children's Hospital quickens medical image processing in RedHat and MOC collab
- Which Programming Languages Use the Least Electricity? - The New Stack
- Debian-goodies - A Set Of Useful Utilities For Debian And Ubuntu Users - OSTechNix
- GitHub - tryolabs/luminoth: Deep Learning toolkit for Computer Vision
- An FUQ for the GDPR | Linux Journal
- How to Run Your Own Git Server | Linux.com | The source for Linux information
- How to Install TeamSpeak Server in CentOS 7
- Circuit VR: Sink or Swim with Current Sources | Hackaday
- Ask Hackaday: Whatever Happened to Wire Wrapping? | Hackaday
- Printed Circuits In The Palm Of Your Hand | Hackaday
- Printed It: Toolbag Essentials | Hackaday
- Harmony Hub Hacked and Patched | Hackaday
- Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World « Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World | FireEye Inc
- HFT On HF, You Can’t Beat It For Latency | Hackaday
- 3D Printing Air Quality Study | Hackaday
- Getting ready for GDPR with Office 365
- 7 ways we have improved our core code base
- 100 percent of organizations have active insider threats
- The Electrical Outlet and How It Got That Way | Hackaday
- Poor mans Bash Bunny – Cron Blog – My personal findings
- Richard Feynman: A Life Of Curiosity And Science | Hackaday
- How Hertha Ayrton Enabled the Titanic to Call SOS | Hackaday
- Hertha Ayrton
- Cloud computing may finally end the productivity paradox
- Half of employees not aware of their company's GDPR preparations
- Microsoft will roll out 'key' GDPR rights globally... not just in Europe
- Chris's Wiki :: blog/tech/DangerousRegistration
- Windows Server Status Monitor (Update Version 1.4) – Stick To The Script
- Economist Bryan Caplan thinks education is mostly pointless showing off. We test the strength of his case. - 80,000 Hours
- UK Decision Makers Unsatisfied with IT Vendor Service | APMdigest - Application Performance Management
- How to stay on top of home improvement ~ Get Rich Slowly
- Pure//Accelerate 2018 – Thursday General Session – Rough Notes | penguinpunk.net
- Sandpits in enterprise data protection » NetWorker Information Hub
- Just one more esxi-guy: vSAN Cluster via PowerCli
- How-To Create a Training Class Through Ravello Training Platform | ESX Virtualization
- pasta salad with roasted carrots and sunflower seed dressing – smitten kitchen
- Slacking Away on vSAN — ThinkCharles.net
- AsteroidOS and OpenWatch Aim to Open Up Smartwatch Market | Linux.com | The source for Linux information
- OpenWatch
- Using Stratis to manage Linux storage from the command line | Opensource.com
- Zuul - A Project Gating System — Zuul documentation
- dbachecks – Save the results to a database for historical reporting | SQL DBA with A Beard
- HP 3PAR CLI Reference Guide - THE SAN GUY
- Multi-tier load-balancing with Linux | Vincent Bernat
- AppDynamics for SAP Released | APMdigest - Application Performance Management
- Windows 10: End of Life for several builds | Born's Tech and Windows World
- How cool is this: EMC’s Recoverpoint goes INSIDE vSphere!
- The Complex Taxation of America’s Retirement Accounts - Tax Foundation
- A newbies guide to ELK - Part 4 - Filtering w/ Grok - mwpreston.net
- Engage 2018, some HUGE announcements and the OGS Replay
- Chris's Wiki :: blog/tech/NoPersonalInfrastructure
- Stop wasting time developing SharePoint Training Manuals - SharePoint Maven
- Suing to Get a 30-Yr-Old Child Out of Your House - Law and Daily Life
- Spotify's GDPR updates add privacy and data download tools
- 'Japan Sales Mastery:' Lessons from 30 years in Japan - Japan Today
- After Meltdown and Spectre, Another Scary Chip Flaw Emerges | WIRED
- VeeamON 2018 Recap | TinkerTry IT @ Home
- Motivation: Take Advantage Of Being 29, 39, 49, or 59 Years Old — My Money Blog
- Windows 10 Upgrade/Servicing tools demoed at MMS 2018 – CCMEXEC.COM – Enterprise Mobility
- I am Disappointed in Frontier Communications - Patshead.com Blog
- Google and Microsoft unveil Spectre V4 CPU vulnerability | Born's Tech and Windows World
- 7 Places to Find Free or Cheap Groceries
- How to Write a Great Resume as a Business Professional
- Intel details fourth Spectre-style CPU security flaw
- 6 Key Pointers for Running Your Virtual Machine Safely
- Training Programs: The Secret to Business Success
- Chris's Wiki :: blog/tech/NFSMyMetricsSplit
- Analyzing Large Capture Files Part 2 – Protocol Hierarchy – Chris Sanders
- PeteNetLive - KB0000515 - VMware - Cannot Cut, Copy, or Paste to and from VM's | PeteNetLive
- Windows: Finding Stale User and Computer Accounts | PeteNetLive
- Visibility is Security | APMdigest - Application Performance Management
- What are Thresholds for Good and Poor Network Packet Loss, Jitter and Round Trip Time for Unified Communications? - Tom Talks
- Use Powershell to Get a List of Users with Out of Office enabled in Outlook Office365 – jasoncoltrin.com
- Windows Download - #1 Windows ISO Download Source
- Generating Good Passwords, Part I | Linux Journal
- States and Their Proxies in Cyber Operations - Lawfare
- Weekend Reading: Backups | Linux Journal
- Speeding Up Netfilter (by Avoiding Netfilter) | Linux Journal
- Security and privacy reminder: Spring clean your systems | Opensource.com
- ‘Crush Them’: An Oral History of the Lawsuit That Upended Silicon Valley - The Ringer
- You-Get - A CLI Downloader To Download Media From 80+ Websites
- After Four Years, AsteroidOS Open-Source Smartwatch OS Is Ready for the Masses
- AsteroidOS
- Red Hat Virtualization 4.2 Adds New High-Performance, SDN Features
- Fixing Disk Signature Collisions – Mark's Blog
- Schedule Task Monitor Script
- Why You Need Cloud Data Backup: Cloud Storage Weaknesses Explained
- IoT for Managed Service Providers: Challenge or Opportunity?
- DSHR's Blog: Prof. James Morris: "One Last Lecture"
- Amazon.com: Charles Platt: Books
- DeployHappiness | The One and a Half Year Bachelor’s Degree for Less Than Free
- 19 Things You Should Make Your Kids Pay For
- Here Are 11 Reasons We Have An Umbrella Liability Insurance Policy — My Money Blog
- Hierarchy of Financial Needs (and the Meaning of Life) | Mad Fientist
- Philippines to integrate open-source electronic medical record platform for enhanced health programs | OpenGovAsia
- Healthcare Open Source Projects Speed Up Technology Adoption
- What Is EVPN? « ipSpace.net by @ioshints
- Kickstart Scripted VMware ESXi Install to USB Media – Michelle Laverick…
- Configuration vulnerability could leave SAP systems open to compromise
- If Facebook had been GDPR compliant would things have been different?
- 73 percent of industrial networks are vulnerable to hackers
- The rise of the experimentation team
- How managed services can help businesses with GDPR [Q&A]
- Younger generations lack understanding of cybersecurity careers
- 18 useful financial rules of thumb ~ Get Rich Slowly
- How the Father of Computer Science Decoded Nature’s Mysterious Patterns - The New York Times
- Ευάγγελος Μπαλάσκας - USBGuard » Evaggelos Balaskas - System Engineer
- Terratest - an Open Source Go Library for Automated Infrastructure Testing
- Perfect Gluten Free Vanilla Cake Recipe -- Allergy Friendly, Dairy Free, Vegan Option | Penniless Parenting
- Ring doorbell flaw lets others watch after password changes (updated)
- Securosis - Blog - Article
- Introducing vSphere 6.7 Security - VMware vSphere Blog
- Cyber Exposure Meets Political Practicality - Blog | Tenable™
- How to Secure and Audit an Amazon Web Services Three-tier Web Architecture - Blog | Tenable™
- Critical Oracle WebLogic Server Flaw Still Not Patched - Blog | Tenable™
- Virtual Instruments Releases VirtualWisdom 5.6 | APMdigest - Application Performance Management
- VirtualWisdom
- Skype for Business to Microsoft Teams Roadmap Update April 23, 2018, 9 Changes - Tom Talks
- The Office 365 train is still steaming along with more than 135 million monthly active users, Microsoft FY18 Q3 Results - Tom Talks
- Labeling endpoint actions with Logstash - Threat Hunting - Syspanda
- Zero Day Initiative — The May 2018 Security Update Review
- What does a CISO actually do? | Thom Langford
- State Machine Testing with Echidna | Trail of Bits Blog
- Windows Incident Response: EDR Obviates Compliance
- Barebone Kickstart setup for CentOS 7 | Velenux Home Page
- IT Monitoring Changing in 2018 | APMdigest - Application Performance Management
- Catchpoint Releases Free Benchmarking Service | APMdigest - Application Performance Management
- The STEM Pipeline: What Can You Do? | Webroot
- Importing McAfee ePO Threat events to ELK - Syspanda
- Monitoring Active Directory with ELK - Syspanda
- VMware PowerCLI - Create Port Groups Script
- VMware PowerCLI - Copy Port Groups Script
- How to thrive at a technical conference - major.io
- The Advent of the Fourth Wave of Computing - Netronome
- Why Bare Metal Does Not Have To Be Nude - Netronome
- The Case for Express Virtio (XVIO) – Part 2 - Netronome
- The Case for Express Virtio (XVIO) – Part 1 - Netronome
- Zero-Trust Security for Cloud Data Centers – How Much Does it Cost? - Netronome
- Samba login using windows AD on Centos 7 | SvennD
- An Updated Look at My Multi-Platform Toolbelt - Scott's Weblog - The weblog of an IT pro specializing in cloud computing, open source, networking, and virtualization
- Our preparations for Europe’s new data protection law
- Data Collection: How To Gather Meaningful Data - Thomas LaRock
- Don't run away from The System, learn to bend it to your advantage - The Matrix has you...
- NIST Updates Risk Management Framework to Incorporate Privacy Considerations | NIST
- First EU cybersecurity law takes effect—with new fines for misbehaving companies – EURACTIV.com
- Is the Irish DPC fit for purpose?
- Building A Windows 10 1803 (April 2018 Update) Reference Image with MDT – Stick To The Script
- Free stock photos · Pexels
- Google outlines GDPR-compliance efforts
- Calculating Cloud Cost: 8 Factors to Watch
- 20 Signs You Are Heading for a Retention Problem
- Why GDPR is Every Security Professional’s Dream - Delta Risk
- Failure without Consequences after Breach - The Ethical Hacker Network
- How to Avoid Bad Clients: 12 Red Flags I Look for to Dodge Nightmare Projects
- Google Online Security Blog: Google CTF 2018 is here
- 'All of Us' Research Project: The Privacy Risks
- Is Converging Your IT and OT Networks Putting Your Organization at Risk? | CSO Online
- Zero Trust: Why ‘cyber insurance’ offers no GDPR compliance | CSO Online
- The rise of the NIST cybersecurity framework | CSO Online
- PowerShell mouse jiggler | Logan Marchione
- Install Python On Windows With A One-Liner - krypted.com
- LasLabs Blog | Storing SSH keys in Active Directory for easy deployment - LasLabs Blog
- LasLabs Blog | Managing SSH Keys Stored in Active Directory - LasLabs Blog
- The Idiot uses Grafana and Influxdb to monitor Proxmox – Jon Spraggins
- Resolved: "Permission denied (publickey)." when trying to access via ssh an Ubuntu Server - Knowledge eXchange
- How to store your ssh public key in a different directory - Knowledge eXchange
- Deployment Research > Research
- Find the repository of all installed packages on Debian or Ubuntu | /contrib/famzah
- Time To Get Back To Basics? | The Networking Nerd
- Packets over a LAN are all it takes to trigger serious Rowhammer bit flips | Ars Technica
- Quick tip: What new products and classifications have been added in the past 30 days to WSUS? | >_
- Doc Searls Weblog · GDPR will pop the adtech bubble
- Career Certification Strategy – vcdx133.com
- vRA Design Considerations – vcdx133.com
- VCDX – Exam Techniques – vcdx133.com
- Deploying vSphere Virtual Machines using Ansible
- vSphere Design Considerations – vcdx133.com
- VSAN Maintenance Mode with PowersHell – Michelle Laverick…
- MSP Backup Pricing Guide: Tips and Strategies
- Red Hat Certification Guide: Overview and Career Paths
- 5 Awesome Open Source Cloning Software - nixCraft
- Spectre, Meltdown made industry collaborate: Red Hat - Security - CRN Australia
- A look at open source image recognition technology | Opensource.com
- Terraform by HashiCorp
- Maximizing Value from Open Source Testing Frameworks - The New Stack
- GitHub - axsh/openvdc: Extendable Tiny Datacenter Hypervisor on top of Mesos architecture. Wakame-vdc v2 Project.
- OpenVNet
- Axsh | Cloud Technology and Network Virtualization
- 18 Tips & Tricks To Speed Up Windows 10 And Make It Faster
- Everything You Need to Know about the Cloud and Cloud Computing, Part I | Linux Journal
- How Misinformation Spreads on Social Media—And What To Do About It - Lawfare
- Keynote: Crossing the River by Feeling the Stones - Simon Wardley - vNinja.net
- VCDX – Throwing Bones – vcdx133.com
- VCDX Journey – Part 3 – Design Scenario – vMusketeers
- VCDX Journey – Part 2 – Where I Messed It Up – vMusketeers
- VCDX Journey – Part 1 – Lessons Learned – vMusketeers
- My VCAP-DCV 6.5 exam experience – VCDX6 in the pocket | viktorious.nl – Virtualization & Cloud Management
- Performance Checklist now available for vSAN benchmarking - CormacHogan.com
- Automate Performance Monitor Statistics Collection for SQL Server and Windows
- Finding ESXi iLO/iDrac Information with PowerCLI
- Making a little nest for your VMs – Michelle Laverick…
- Upgrade Raspbian Jessie to RaspbianStretch | Marco Franssen
- 10 “Notes to Self” that Will Stop You from Taking Things Personally
- RedHunt OS - Virtual Machine For Adversary Emulation And Threat Hunting - KitPloit - PenTest Tools for your Security Arsenal ☣
- WSSAT v2.0 - Web Service Security Assessment Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- Astra - Automated Security Testing For REST API's - KitPloit - PenTest Tools for your Security Arsenal ☣
- hBlock - Improve Your Security And Privacy By Blocking Ads, Tracking And Malware Domains - KitPloit - PenTest Tools for your Security Arsenal ☣
- Zoom - Automatic & Lightning Fast Wordpress Vulnerability Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- AutoTTP - Automated Tactics Techniques & Procedures - KitPloit - PenTest Tools for your Security Arsenal ☣
- New certificate in cybersecurity and data privacy law responds to student demand
- 1.13M Records Exposed by 110 Healthcare Data Breaches in Q1 2018
- How to conduct an ISO 22301-compliant business impact analysis – IT Governance Blog
- New criminal hacking group targets healthcare organisations – IT Governance Blog
- Companies continue to download faulty software exploited in Equifax breach
- GDPR-US-10-things-you-need-to-know-052018_final.pdf
- Securing IoT in Healthcare is Critical | CSO Online
- What is a Chief Security Officer? Understanding this critical role | CSO Online
- Breakout Time: A Critical Key Cyber Metric
- Microsoft's Patch Tuesday Fixes Two CVEs Under ...
- Some ideas about Oracle Database on Docker - Blog dbi services
- Simon Wardley – Strategy by Mapping,Crossing the River by Feeling the Stones — EtherealMind
- Person with diabetes finds open source and builds her own medical device | Opensource.com
- Equifax confirms data breach included driver's licenses and passports
- Security Vendor Sales Pitches and Empty End Point Promises
- Security baseline for Windows 10 “April 2018 Update” (v1803) – FINAL – Microsoft Security Guidance blog
- First things first: Envisioning your security deployment – Microsoft Secure
- The Ransomware Sausage Factory – Do You Really Want To Know How They Got Your Data Back?
- What is tar and why does OpenShift Container Application Platform use it? - Red Hat Customer Portal
- Understanding the Role of Multi-Stage Detection in a Layered Defense
- Different block sizes when you plugin? – Upgrade your Database - NOW!
- How to convert/split p12 certificates into single files – – Unixblogger –
- Security Trade-Offs in the New EU Privacy Law — Krebs on Security
- JPCERT/CC Blog: JPCERT/CC Publishes "Vulnerability Coordination and Disclosure Policy"
- NIS Directive and GDPR double jeopardy: Can you be fined twice for the same breach? – IT Governance Blog
- Software to support your GDPR compliance project – IT Governance Blog
- List of data breaches and cyber attacks in April 2018 – 72,611,721 records leaked – IT Governance Blog
- The GDPR and the right to be forgotten – IT Governance Blog
- The GDPR: Get a crucial cyber security qualification in one day – IT Governance Blog
- Investors must pay closer attention to cyber threats – IT Governance Blog
- Infographic: How to comply with the NIS Directive – IT Governance Blog
- Securing top management’s approval of your BCMS is crucial – IT Governance Blog
- 5 things you need to know about CIR management – IT Governance Blog
- 5 benefits of an ISO 22301-conforming BCMS – IT Governance Blog
- The Scottish Cyber Resilience Strategy for health boards – IT Governance Blog
- Cyber risk and resilience: A guide for the board and senior management – IT Governance Blog
- Cloud service providers and the NIS Directive – are you resilient enough? – IT Governance Blog
- (31) APPSEC Cali 2018 - ReproNow - Save time Reproducing and Triaging Security Bugs - YouTube
- Ray Ozzie’s plan for unlocking encrypted phones gets a chilly reception | Ars Technica
- (31) Track 2 00 Preparing for Incident Handling and Response within Industrial Control Networks Mark Stac - YouTube
- Is Article 27 the GDPR's 'hidden obligation'?
- Massachusetts Senate passes data breach bill regulating consumer reporting agencies
- Store 6000+ Records & Breach Costs Will Exceed Security Investment: Report - Infosecurity Magazine
- What's the future hold for US health care privacy regulation?
- Equifax has spent $242.7 million on its data breach so far | ZDNet
- Companies launch open-source GDPR framework for DSARs
- Recent Ransomware Incidents Serve Up Lessons - HealthcareInfoSecurity
- FDA Unveils Plan for ‘Software as a Medical Device’ Review
- The Best Strategy for Cyber-Conflict May Not Be a Cyber-Strategy
- (31) APPSEC Cali 2018 - Closing Keynote - Digital Disease: How Healthcare Cybersecurity Challenges... - YouTube
- Infosecurity.US - Web Log - QOTD Esther Dyson
- GDPR Is Coming. Is Your Organization Ready?
- PyRoMine Malware Sets Security Industry on Fire
- 5 Top Cybersecurity Themes at RSA 2018 - HealthcareInfoSecurity
- How Triton Malware Targets Industrial Control Systems
- Is Payments Industry Ready for New Encryption Protocols?
- SamSam Ransomware Offers Volume Decryption Discount
- Certain Becton Dickinson Products at Risk for 'KRACK' Flaw
- How Authentication Must Evolve in the Age of GDPR
- Former Physician Convicted of Criminal HIPAA Violation
- The Biggest “Small” Personal Digital Security Mistakes – tisiphone.net
- Texas Hospital CEOs: Cybersecurity Is No. 1 Worry
- Multitouch 'skin' makes your body the controller
- Lesley on Brakeing Down Incident Response Podcast – All About Playbooks – tisiphone.net
- Finally, a free open-source database for all Canadian startup information | Financial Post
- USB Device Tracking using the Partition/Diagnostic Event Log - Digital Forensics Stream
- Every Business Needs a Vulnerability Disclosure Policy. Every. Single. Business. - The Ethical Hacker Network
- Why Am I Getting All These Terms of Service Update Emails? | Electronic Frontier Foundation
- Bring in the Nerds: EFF Introduces Actual Encryption Experts to U.S. Senate Staff | Electronic Frontier Foundation
- Building a freedom-based photography community | Opensource.com
- Spicy Garlicky Stir Fried Eggplant Recipe -- Paleo, Vegan, and Easy | Penniless Parenting
- There is No Middle Ground on Encryption | Electronic Frontier Foundation
- WEBCAST: Web App Assessments for Non-Majors - Black Hills Information Security
- Analyzing Large Capture Files Part 1 – Colorizing Conversations in Wireshark – Chris Sanders
- 'Zero Login:' The Rise of Invisible Identity
- Sarah Squire
- 3 Ways to Maximize Security and Minimize Business ...
- GDPR Requirements Prompt New Approach to Protecting ...
- Ransomware Attacks Jumped 400% Worldwide in 2017
- Automation Exacerbates Cybersecurity Skills Gap
- What Meltdown and Spectre Mean for Mobile Device ...
- Encryption is Necessary, Tools and Tips Make It Easier
- Spectre Returns with 8 New Variants
- 5 Ways to Better Use Data in Security
- Calling all open source advocates: join the GPL Cooperation Commitment
- Going through the 7 stages of GDPR | CSO Online
- Best security software, 2018: How 9 cutting-edge tools tackle threats | CSO Online
- GDPR-defined personal data can be hard to find—here's where to look | CSO Online
- China increases employee surveillance, creating its own Thought Police | CSO Online
- Branding infosec: Why security should consider its own internal advertising campaign | CSO Online
- Can Shadow IT Be Good for Enterprises? | CSO Online
- Updates to Ansible Playbook for Usenet Docker containers | Calvin Bui
- Cybersecurity Tech Accord
- Cyberwar: Silicon Valley’s new bright, shiny thing | CSO Online
- Why securing containers and microservices is a challenge | CSO Online
- Conway's Law: does your organization’s structure make software security even harder? | CSO Online
- What is cyber resilience? Building cybersecurity shock absorbers for the enterprise | CSO Online
- Adopt the NIST cybersecurity framework (CSF) and harness the wisdom of crowds | CSO Online
- Insuring Uncle Sam’s cyber risk | CSO Online
- Starting and Stopping Azure Virtual Machines Using Azure PowerShell
- vCenter Service Appliance 6.7 Tips and Tricks | Virten.net
- Berkshire Hathaway Shareholder Meeting Full Videos, Transcripts, and Podcasts — My Money Blog
- About updating inbox PowerShell modules | >_
- Spectre-NG: Security bods uncover eight new 'Spectre-class' flaws in Intel CPUs
- Yale Scientists Found 'Time Crystal' In The Unlikeliest Place
- US elevates the role of Cyber Command
- Chinese spies linked to decade-long hacking campaign
- Solved: DNS Forwarding 100K+ Entries - Ubiquiti Networks Community
- Should a SaaS provider open source its primary platform? | Opensource.com
- NHS will upgrade all systems to Windows 10 following WannaCry outbreak
- Rob Shaw, Deputy Chief Executive
- Welcome to brigade’s documentation! — brigade 0.0.1 documentation
- Dell Technologies World 2018 – storage.12 – XtremIO X2: An Architectural Deep Dive Notes | penguinpunk.net
- StarEast, InteropITX and GDPR - DBA Kevlar
- Deploy a Cloudera cluster with Terraform and Ansible in Azure - part 2 - Blog dbi services
- SQL Server Security: Are your databases ready for the GDPR? - Blog dbi services
- On the Myth of the 10X Engineer and the Reality of the Distinguished Engineer – Charting Stacks
- Cloud Not Just Someone Else's Computer · Lindsay Hill
- Testing VSAN 6.7 network outages on Ravello is easy! – vMusketeers
- To Be a 10x Engineer, or Not to Be - IOD: [tech.content]
- 10X Engineers - Quora
- Dell Technologies World 2018 – Dell EMC Announces PowerMax | penguinpunk.net
- What’s The Buzz About StorageOS? | penguinpunk.net
- We Have to Learn How to Manage the Cattle « ipSpace.net by @ioshints
- Qucs project: Quite Universal Circuit Simulator
- Introducing zchunk
- Working around Intel Hardware Flaws | Linux Journal
- This Russian Company Sells Zero-Day Exploits for Hospital Software - Motherboard
- De-Googling my phone · Martin Pitt
- A brief history of bad passwords | Opensource.com
- Open Source Password Management Solutions | Bitwarden
- GitHub - google/gvisor: Container Runtime Sandbox
- May 2018 Issue: Privacy | Linux Journal
- Privacy Is Still Personal | Linux Journal
- Weekend Reading: Qubes | Linux Journal
- The GDPR Takes Open Source to the Next Level | Linux Journal
- Where is serverless computing headed? | Opensource.com
- What is Windows 10 Timeline? How To Use It Like A Pro?
- POWERCFG: How To Check Battery Health Report And Energy Report In Windows Using CMD
- How to Install and Configure Redis on Ubuntu 18.04 and Speed Up WordPress Using Redis Caching | Dotlayer
- A Bash Script to Create a Bootable USB from ISO in Linux
- How to Install BookStack Documentation Wiki on CentOS 7
- Is it Time to Regulate Cyber Conflicts? - Lawfare
- What works best Clean Install or Dirty Upgrade?: VMware ESXi Upgrade on HP ML350e Gen8 – Michelle Laverick…
- DELL N4032 / HP HP ProCurve Switch 2810 / Juniper SRX 300 cheat sheet – Laurent Domb OSS Blog (RHCA, AWS SAA,ITIL, eMBA)
- Qemu now supports the HPPA in softmmu mode! | Virtually Fun
- What's New in vSphere 6.7? Should I Upgrade?
- Managed Services Market Trends to be Aware of in 2018
- How to Create a Business Project When It's Your College Homework
- VCSA 6.5 AD Lookup Issues #DNS #DIG #VMware #vExpert #VCSA #vCenter – vMusketeers
- vSphere 6.7 – Let’s break it down! - VirtuallyInclined.com
- Sysadmin Stories: PowerCLI - Batch migrate VM network adapter
- Incremental vs Differential Backup: Difference Explained
- Technology Short Take 98 - Scott's Weblog - The weblog of an IT pro specializing in cloud computing, open source, networking, and virtualization
- 3 questions about Kata Containers answered | Opensource.com
- Automating Labs…Now With YAML and Multi-Threading! – neckercube.com
- CCNA Training » GRE Tunnel Tutorial
- Things to do after installing Ubuntu 18.04 Bionic Beaver Linux - LinuxConfig.org
- Overview on Android x86 Project & Call to Help – FOSS Post
- A look at Peek screen recorder for GNU/Linux - gHacks Tech News
- Timeshift review - Let's do the time warp again
- Red Hat Launches All-In-One Data Center Storage Solution
- Weekend Reading: Privacy | Linux Journal
- Researchers Spent 10 Years Creating This "Master Key" To Unlock Millions Of Hotel Rooms
- How to randomize DNS resolver selection in Knot Resolver – Ctrl blog
- Zero D’Eh: Canada Takes a Bold Step Towards Offensive Cyber Operations - Lawfare
- The best and worst laptop brands 2018
- StorageNewsletter » Daily Breaking News for the Worldwide IT Storage Industry
- New IRS Data Shows Most IRA Contributions Were Made by Middle-Class Taxpayers - Tax Foundation
- Social media has a censorship problem of its own making
- The perfect is the enemy of the good ~ Get Rich Slowly
- OpenDedup – Opensource Dedupe to Cloud and Local Storage
- Zenko - Scality’s Open Source Multi-Cloud Data Controller
- Non-Malware Attacks: What They Are and How to Protect Against Them?
- Why Hackers Love Healthcare
- Recent BA Ransomware Incidents Serve Up Lessons
- TECH-T08-It's-Time-to-Kill-the-Pentest.pdf
- 5 signs you've been hit with an advanced persistent threat (APT) | CSO Online
- Atlanta's recovery highlights the costly mistake of being unprepared | CSO Online
- Why does your most important database run on Oracle 10.2.0.4?
- Oracle Fusion Middleware Infrastructure 12.2.1.2.0 - Probable Incorrect Firewall Configuration - Blog dbi services
- If You're Not Doing Continuous Asset Management You're Not Doing Security
- NBlog - the NoticeBored blog: NBlog April 24 - privacy policies under GDPR [UPDATED]
- One month out: Top 6 steps for GDPR compliance
- 9 steps to implementing ISO 27001 – IT Governance Blog
- Risk Analysis Requirement Survives ‘Meaningful Use’ Revamp
- GDPR compliance in a nutshell | CSO Online
- All About Versions – Time to Upgrade? | ThatJeffSmith
- How This Artist Finds Abstract Art in Footage of Nuclear Explosions - Motherboard
- How to Use Sensu and RabbitMQ on Ubuntu to Monitor Your WordPress Website | Sitety
- How to Install Log.io Realtime Log Monitoring Tool on Ubuntu 16.04 LTS
- [Howto] Using Ansible to manage RHEL 5 systems – /home/liquidat
- Health care data breaches included in Arizona's new notification law
- MalPipe - Malware/IOC Ingestion And Processing Engine - KitPloit - PenTest Tools for your Security Arsenal ☣
- TR Center - Man in the Arena
- A closer look at the GDPR’s technical requirements – IT Governance Blog
- Reading The F****** Manual: Setting Up VMware PowerCLI 10.x – Michelle Laverick…
- A simple Pivotal Container Service (PKS) deployment - CormacHogan.com
- Cilium 1.0: Bringing the BPF Revolution to Kubernetes Networking and Security — Cilium
- BPF, eBPF, XDP and Bpfilter… What are these things and what do they mean for the enterprise? - Netronome
- Chris's Wiki :: blog/linux/HiDPILinuxHassles
- Cookiescanner - Tool For Check The Cookie Flag In Multiple Sites - KitPloit - PenTest Tools for your Security Arsenal ☣
- 5 steps to an effective ISO 27001 risk assessment – IT Governance Blog
- A catastrophic cyber attack is imminent, says UK government – IT Governance Blog
- Why you shouldn’t ignore the NIS Directive – IT Governance Blog
- Passing the AWS Certified Solutions Architect – Associate Exam 2018 Exam #AWS @acloudguru @AWS @AWS_UKI #vExpert – vMusketeers
- Patching my databases with the April 2018 PSU, BP and RU
- Insider Threat: Putting Theory Into Practice - HealthcareInfoSecurity
- Why is the kernel community replacing iptables with BPF? — Cilium
- Spectre and Meltdown's Critical Impact on Cloud Providers and Customers
- Quick Take-Aways From the RSA Security Conference | CSO Online
- Total Meltdown (not Meltdown!) exploit now available @ AskWoody
- Windows Privilege Escalation - Unquoted Services - The Ethical Hacker Network
- Just solve the problem! ~ Get Rich Slowly
- www.moosecon.com
- Infrastructure Hardening · Veeam Backup & Replication Best Practices
- Tom Sneddon's stuff
- Batch Script Tutorial
- Android-x86 - Porting Android to x86
- GitHub - joaomatosf/jexboss: JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
- DosTips - The DOS Batch Guide
- Francis Lam's Weapons-Grade Ratatouille | The Splendid Table
- GDPR kills the American internet: Long live the internet!
- VMware Product Interoperability Matrices for VMware vSphere Hypervisor (ESXi) | TinkerTry IT @ Home
- Making Use Of The search Option In resolv.conf
- Aaron Toponce : Use A Good Password Generator
- The Difference Between URLs and URIs
- Giving social networking back to you - The Mastodon Project
- Unable to login because of a ESXi root account lockout - IVOBEERENS.nl
- What to know about Spectre and Meltdown with VMware environments - IVOBEERENS.nl
- Conversation Intelligence Technology for Sales Teams | Gong.io
- GitHub - BloodHoundAD/BloodHound: Six Degrees of Domain Admin
- Scanning and Patch Auditing VMware Using Nessus - Blog | Tenable™
- Security Orchestration and Automation for Security Operations | Rapid7
- GitHub - nccgroup/Scout2: Security auditing tool for AWS environments
- Open Source Management and Monitoring System for Ceph | openATTIC
- Index of /
- Including OWASP ModSecurity Core Rule Set – Welcome to netnea
- The Working Centre
- Introducing Mastermind: Powerful and Simple Deployment, Scaling, Load Balancing and Testing of Applications in the Cloud – Microsoft Faculty Connection
- OH2BNF's Plan for a Large Scale Raspberry SDR (LSR-SDR) Based on RTL-SDR Dongles - rtl-sdr.com
- Life On Contract: Lowering Your Cost without Dropping Your Price | Hackaday
- 5 Things You Have to Know About the Dangers of Ransomware
- The 3 Best Ways to Scan Your Old Photos (And Why You Should)
- Learn About Cybersecurity with These 11 Essential Videos
- 7 Types of Ransomware That Will Take You by Surprise
- When Hackerspace Directors Burn Out | Hackaday
- GDPR Data Discovery On Tap from Raz-Lee - IT Jungle
- A lesson in wireless engineering from the Raspberry Pi
- Security Patches: Move Faster to Keep Up With the Bad Guys - Security Boulevard
- 2018 Phishing Trends & Intelligence Report: The Shift to Enterprise - Security Boulevard
- 20 Critical Security Controls: Control 7 – Email and Web Browser Protections - Security Boulevard
- What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders | CSO Online
- Using Rubber Ducky To Steal Encrypted Data | CQURE Academy
- Ransomware (with Allan Liska & Tim Gallo) - Advanced Persistent Security
- NSA reveals how it beats 0-days – Naked Security
- 20 Critical Security Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit Logs - Security Boulevard
- OWASP APPSEC Cali 2018, Anthony Trummer's 'European Vacation: Leveraging GDPR For Security' - Security Boulevard
- Technology for GDPR Compliance: Turning Plans into Action - Security Boulevard
- Why Cyber-Security Is Critical to The Loyalty of Your Most Valued Customers - Security Boulevard
- What Harm Can Come From Missing 59,000 Vulnerabilities?
- Doing OSINT and Twitter Analytics with Tinfoleak - Koen Van Impe - vanimpe.eu
- SMBrute - SMB Protocol Bruteforce - KitPloit - PenTest Tools for your Security Arsenal ☣
- RTA (Red Team Arsenal) - An Intelligent Scanner To Detect Security Vulnerabilities In Companies Layer 7 Assets - KitPloit - PenTest Tools for your Security Arsenal ☣
- How to write a GDPR-compliant personal data breach notification procedure – IT Governance Blog
- Keep your professional services firm’s papers under wraps for GDPR compliance – IT Governance Blog
- MPs agree there is a “long way to go” to bring cyber security up to standard in the NHS – IT Governance Blog
- FDA Proposes Action to Enhance Medical Device Cybersecurity
- CYMSAB
- Countdown to GDPR: Part 2 — Opportunities and challenges
- How To Start Taking Control Of Your Data - Essential Privacy Tools
- A brief guide to cyber security risk assessments – IT Governance Blog
- GRC Evolves Into Integrated Risk Management - HealthcareInfoSecurity
- Abbott Issues Software Patches for More Cardiac Devices
- What Came First: VLANs or VRFs? « ipSpace.net by @ioshints
- Chris's Wiki :: blog/solaris/ZFSWhyIOInRecordsize
- UUID of hard disk | SvennD
- Installing and Configuring Windows Server Update Services with Windows Server 2016 Core – Stick To The Script
- Self-hosted videos with HLS | Vincent Bernat
- GDPR Scope Queries for Oracle E-Business Suite | Integrigy
- How to recycle your used and unwanted gadgets
- FDA Proposes Action to Enhance Medical Device Cybersecurity
- This Japanese Budgeting System Could Be the Key to Saving Big Bucks
- kakeibo
- How to be happy and lead a meaningful life ~ Get Rich Slowly
- How will the GDPR impact open source communities? | Opensource.com
- Backup And Restore Application Settings On Newly Installed Linux System - OSTechNix
- Failure to automate: 3 ways it costs you | The Enterprisers Project
- Richard Stallman, RMS, on Privacy, Data, and Free Software
- Privacy as an Afterthought: ICANN's Response to the GDPR | Electronic Frontier Foundation
- Create Dynamic Wallpaper with a Bash Script | Linux Journal
- Life After WannaCry's Wake-Up Call: What's Next?
- Health Data Breach Tally Spikes in Recent Weeks
- The Agony and the Ecstasy of Cloud Billing | Linux Journal
- Running Jenkins builds in containers | Opensource.com
- The IoT Hacker's Toolkit · System Overlord
- How to build confidence (and destroy fear)
- Firewall Management Software | Network Security Monitoring
- Application Risk Module - Kenna Security
- Zero Trust Security Model | Alexander's Blog
- GDPR and client-side tools
- Tips and Tricks for Detecting Insider Threats
- Tinfoleak v2.4 - The Most Complete Open-Source Tool For Twitter Intelligence Analysis - KitPloit - PenTest Tools for your Security Arsenal ☣
- Healthcare Exchange Standards: IHE Perspective on EU GDPR
- PowerShell Script to Monitor Active Directory Health | Alexander's Blog
- Mesos and Marathon REST API via cURL - A Hello World Example
- Testing the Hetzner Cloud API via cURL - IaaS Automation -
- DICOM Library - Anonymize, Share, View DICOM files ONLINE
- DICOM Library - Anonymize, Share, View DICOM files ONLINE
- IT Automation Part III: Saltstack "Hello World" Example -
- IT Automation Part II: Ansible "Hello World" for Templating -
- IT Automation Part I: Ansible "Hello World" Example using Ansible on Docker -
- GitHub - ubeeri/Invoke-UserSimulator: Simulates common user behaviour on local and remote Windows hosts.
- Finding purpose: 12 exercises to help you discover purpose and passion
- ICND1 & ICND2 » ICND1 – VLAN Questions
- ICND1 & ICND2 » ICND2 – OSPF Questions 4
- ICND1 & ICND2 » ICND2 – OSPF Questions 3
- ICND1 & ICND2 » ICND2 – OSPF Questions 2
- ICND1 & ICND2 » ICND2 – OSPF Questions
- Cisco and System Security Basics: Learning By Doing: Challenges
- ICND1 & ICND2 » ICND2 – InterVLAN Questions
- ICND1 & ICND2 » ICND2 – RSTP Questions 2
- ICND1 & ICND2 » ICND2 – STP Questions 2
- ICND1 & ICND2 » ICND2 – STP Questions
- Cisco and System Security Basics: CDP: Building Topology Diagram
- Cisco and System Security Basics: Cheap Hacker's Lab
- Cisco and System Security Basics: Passive Reconnaissance - Flowers in Corp Web Page
- Order of Precedence when Configuring ASP.NET Core – Premier Developer
- Cisco and System Security Basics: Cisco: Beginner Level
- Cyber Defense | PowerShell Script to Block Cortana for Privacy | SANS Institute
- Weekly Cyber Risk Roundup: Orbitz Breach, Facebook Privacy Fallout - Security Boulevard
- 6 practices for super smooth Ansible experience by Maxim Chernyak
- Vagrant - Complex Vagrantfile Configurations - EverythingShouldBeVirtual
- The Anatomy of an Instant Clone - VMware Blogs
- Getting Started With Vagrant
- Configuration - VirtualBox Provider - Vagrant by HashiCorp
- Migration and Disaster Recovery in the Oracle Cloud with Rackware | Oracle Cloud Infrastructure Blog
- How to Disable, Uninstall or Reinstall OneDrive in Windows 10
- Tap Drill Sizes
- Protecting routers and other network equipment
- GDPR 'Murica! - DBA Kevlar
- Linux 101 for SQL Server DBAs, Part II - DBA Kevlar
- SQL Server Operations Studio - DBA Kevlar
- GDPR Solutions in the Day of Automation - DBA Kevlar
- Hadoop Architecture | HDFS Architecture | HDFS Tutorial | Hadoop Tutorial – DBA Tutorials
- ISO/IEC 27001 and Why It Matters for Your Business
- When Your Greatest Cybersecurity Doubters Are in the C-Suite - Security Boulevard
- 20 Critical Security Controls: Control 10 - Data Recovery Capabilities
- A week in security (April 02 – April 08) - Security Boulevard
- The Future of GPOs - JumpCloud
- MY TAKE: A breakdown of why Spectre, Meltdown signal a coming wave of ‘microcode’ attacks - Security Boulevard
- What do you wish osquery could do? - Security Boulevard
- OPM provides guidance to address cybersecurity skills gap - Security Boulevard
- Netsparker Surveys US Based C-Levels on GDPR Compliance - Security Boulevard
- Efficiently Testing Pipelined Microservices - Security Boulevard
- Infrastructure-as-Code: Project Update - Virtual Elephant
- Oracle Instance – Prakash Blog
- GROW THAT DBA CAREER – Prakash Blog
- Infrastructure-as-Code: Project Overview - Virtual Elephant
- Infrastructure-as-Code: Bootstrap CoreOS with Ignition - Virtual Elephant
- Infrastructure-as-Code: Understanding CoreOS Ignition - Virtual Elephant
- Infrastructure-as-Code: Getting started with Ansible - Virtual Elephant
- Infrastructure-as-Code: Ansible for VMware NSX - Virtual Elephant
- VCDX Quick Hit - Monitoring and Alerting - Virtual Elephant
- Docker for Ansible + VMware NSX Automation - Virtual Elephant
- Enhanced NSX Modules for Ansible - Virtual Elephant
- oVirt hosted engine with zfs storage - My Wired House
- Manage SCCM configuration items and baselines with community tools – 4sysops
- Tailing the Alert Log with SQLcl | ThatJeffSmith
- A Place to Learn Oracle, No Setup Required | ThatJeffSmith
- UK GCHQ director confirmed major cyberattack on Islamic StateSecurity Affairs
- JeremyFleming
- “Need to Know” for Oracle DBA Begineers – Prakash Blog
- The DBA works at the intersection of the database, server, operations group, and developers. A DBA must understand concepts from all these facets of IT as well as be able to draw upon knowledge of their production environment to troubleshoot performance, hardware, and software issues.
- RAC Notes Scanned Documents – Prakash Blog
- Database Authentication with a Smart Card – Part 3 | Late Night Oracle Blog
- Deploy a Cloudera cluster with Terraform and Ansible in Azure - part 1 - Blog dbi services
- Oracle Backup and Recovery Solutions – Prakash Blog
- SOLVED: Application Data.. repeating recursion | Wordlinks' Blog
- Disable or Uninstall OneDrive Completely in Windows 10 - Tech Journey
- 20 Ways to Increase the Efficiency of the Incident ...
- As Businesses Rush to Comply with GDPR, Some Face Costs of over $1 Million - Security Boulevard
- Tenable Research Advisory: AXIS Camera App Malicious Package Distribution Weakness - Blog | Tenable™
- Zuckerberg Unveils the Cyber-Naivete of Congress - Security Boulevard
- Best Buy the Latest Victim of Third-Party Security ...
- A Nonverbal Analysis of Mark Zuckerberg’s Congress Testimony - Social-Engineer.Com - Professional Social Engineering Training and Services
- Are your Android devices updated? Researchers say maybe noSecurity Affairs
- Security Affairs newsletter Round 157 – News of the weekSecurity Affairs
- The Real Industry Behind Fake Electronics - Motherboard
- Vigilante hackers strike Russia and Iran Networks exploiting Cisco CVE-2018-0171 flawSecurity Affairs
- Pairing Policy & Technology: BYOD That Works for ...
- Slideshows - Dark Reading
- Avoiding the Ransomware Mistakes that Crippled ...
- 7 Steps to a Smooth, Secure Cloud Transition
- 7 Non-Financial Data Types to Secure
- Businesses Calculate Cost of GDPR as Deadline Looms
- Video: MDT 2013 log files basics (bdd.log and smsts.log) | Keith's Consulting Blog
- Basic Usage - Provisioning - Vagrant by HashiCorp
- GitHub - Or3stis/apparatus: A graphical security analysis tool for IoT networks
- ASTo - An IoT Network Security Analysis Tool and Visualizer - KitPloit - PenTest Tools for your Security Arsenal ☣
- APNIC Labs enters into a Research Agreement with Cloudflare | blabs.apnic.net
- The Art of Soldering - Motherboard
- Atlanta, Colorado DOT ransomware mitigation costing millions
- Journey Into Incident Response: Process Hollowing Meets Cuckoo Sandbox
- Journey Into Incident Response: Making Incident Response a Security Program Enabler
- Journey Into Incident Response: Introducing the Active Threat Search
- Journey Into Incident Response: Security Monitoring with Attack Behavior Based Signatures
- Journey Into Incident Response: Triage Practical Solution – Malware Event – Proxy Logs Prefetch $MFT IDS
- GitHub - infobyte/faraday: Collaborative Penetration Test and Vulnerability Management Platform
- How GDPR could impact US health care providers
- Security baselines should underpin efforts to manage cybersecurity risk across sectors – Microsoft Secure
- Building a Successful Security Operations Center (SOC): Part 4Rafeeq Rehman – Personal Blog
- Vulnerability Assessment | Detect Vulnerabilities in Binaries via Hash Lookup
- Microsoft to deliver new products and strategies for security innovation at 2018 RSA Conference – Microsoft Secure
- Why the cyber security skills gap is so damaging – IT Governance Blog
- How are the C-Suite failing cyber security? – IT Governance Blog
- 10 key areas to identify gaps in your GDPR compliance – IT Governance Blog
- Why ISO 27001 is integral to data protection compliance – IT Governance Blog
- The GDPR: What technical measures do you need to conduct? – IT Governance Blog
- Healthcare Exchange Standards: IHE on FHIR tutorial
- Healthcare Exchange Standards: De-Duplicating the received duplicate data
- 2018 Data Breach Investigations Report | Verizon Enterprise Solutions
- 2018-02.pdf
- GitHub - XalfiE/Nix-Auditor: Nix Audit made easier (RHEL, CentOS)
- The Impact of All 50 States Having Breach Notification Laws
- Trusted insider at the federal level raises concerns | CSO Online
- Imran Awan
- Facebook's Zuckerberg Pledges Worldwide GDPR Compliance
- Sep 2011 - C_inaday-NL-ISACA-Erik-van-Eeeden-Cobit.pdf
- WSUS Automated Maintenance (Formerly Adamj Clean-WSUS) - Script Center - Spiceworks
- The CISO as an Internal Security Evangelist - HealthcareInfoSecurity
- How to setup SOC using open-source tools – Sath
- Healthcare Data Management | Commvault
- VMware Storage IO Control (SIOC) Overview
- Open Security Operations Center
- On Old Configs and Automation | The Networking Nerd
- Mind Map for CCIE & CCNP Routing & Switching – neckercube.com
- Mellanox, Ixia and Cumulus: Part 3 - MovingPackets.net
- Mellanox, Ixia and Cumulus: Part 2 - MovingPackets.net
- Mellanox, Ixia and Cumulus: Part 1 - MovingPackets.net
- Container Security through Segregation « ipSpace.net by @ioshints
- The Death Of Expertise
- Security baseline for Windows 10 (v1511, "Threshold 2") — FINAL – Microsoft Security Guidance blog
- Article: Using Secedit To Apply Security Templates | ITNinja
- Infront Consulting Group - Microsoft IT solutions and software
- Business Intelligence and Big Data Analytics Softwa
- high performance WAF platform with Naxsi and HAProxy - HAProxy Technologies
- Configuring Apache in front of JBoss Application Server Using mod_jk
- The answers to your questions for Eben Upton - Raspberry Pi
- Explaining and Demonstrating Jam and Replay Attacks on Keyless Entry Systems with RTL-SDR, RPiTX and a Yardstick One - rtl-sdr.com
- How to clean a circuit board - The Silicon Underground
- Kubernetes 1.10 Released - via @codeship | via @codeship
- Looking inside a .NET core process using windbg – Rohith's blog
- Compare two text files with PowerShell – neo
- Ramping up on Powershell & CLI – Premier Developer
- The Japanese Calendar’s Y2K Moment – I'm not a Klingon ( )
- Cooking for Beginners: 5 Essential Sites for Newbies in the Kitchen
- DSHR's Blog: Natural Redundancy
- The Raspberry Pi 3B+ As An SDR – Without The SDR! | Hackaday
- A comprehensive guide to Docker Networking – Marksei
- The Bootup Baseline (by Tony Fortunato)
- Deployment Research > Research
- Lawmakers want more tech companies to address privacy legislation
- Katello: Create a Domain, Subnet, Installation Media, OS, Provisioning Templates, Host Groups, PXE Boot | Lisenet.com :: Linux | Security | Networking
- 50 State Infographic: How Much Income Do You Need to Afford the Average Home? — My Money Blog
- Automating 4,000 Microsoft SQL Databases with Rubrik, REST APIs, and PowerShell – Virtually Sober
- AWS Online Tech Talks – April & Early May 2018 | AWS News Blog
- How to create vSphere VMs with RDM disks
- Tackling L33t-Speak | Linux Journal
- Agedu - A Useful Tool for Tracking Down Wasted Disk Space in Linux
- Simple Cloud Hardening | Linux Journal
- Blockchain, Part I: Introduction and Cryptocurrency | Linux Journal
- Weekend Reading: Sysadmin 101 | Linux Journal
- 20 Outstanding Backup Utilities for Linux Systems in 2018
- How Wizards and Muggles Break Free from the Matrix | Linux Journal
- Install an OpenStack cloud with Jenkins | Opensource.com
- Laverna - keep your notes private
- Capsule8 - Zero-day attack detection for modern Linux environments
- How to Boot Debian 9 ISO File Directly From Hard Drive With GRUB2
- 42 Books That Will Make You A Better Person (Each Described In 1 Sentence) | RyanHoliday.net
- A Google Cloud Platform Primer with Security Fundamentals
- 6 Steps for GDPR Readiness
- 20 Critical Security Controls: Control 16 - Account Monitoring and Control
- What is Virtual Hardening for Websites? Read all about it.
- 20 Critical Security Controls: Control 17 – Implement a Security Awareness and Training Program - Security Boulevard
- Improved Cybersecurity Measures for Better Organizations | Netswitch Technology ManagementNetswitch Technology Management
- Web Application Firewalls: The Definitive Primer - Security Boulevard
- 10 Best Practices for Mobile App Penetration Testing
- 20 Critical Security Controls: Control 15 - Wireless Access Control
- Establishing a Global Security Operations Center (GSOC) - Security Boulevard
- GDPR Countdown Checklist: 3 Strategic To-Do’s for Cybersecurity Teams - Security Boulevard
- Why Enterprises Should Control Their Encryption Keys - Security Boulevard
- It’s Complicated - Operational Security for Developers - Security Boulevard
- Burp Suite continuing the Saga - Security Boulevard
- SamSam Ransomware: How to Identify and Mitigate the Risk - Security Boulevard
- Real-Time Analytics for PCI Compliance - Security Boulevard
- Annual Report Shows Increased Maturity in Security Operations - Security Boulevard
- SAP HANA Pentesting. Part 1: Vulnerabilities history
- SecurityEverAfter 2018-03-29 21:17:00 - Security Boulevard
- 3 Payloads in Healthcare Data Breaches - Security Boulevard
- 20 Critical Security Controls: Control 12 - Boundary Defense
- OWASP APPSEC Cali 2018, Josh Sokol's 'Architecting for Security in the Cloud' - Security Boulevard
- Intelligent SOC Series: The Role of Your SOC in Managing Digital Risk - Security Boulevard
- RAVELLO: Troubleshooting VSAN Network connectivity issues – vMusketeers
- VMware Specialist: vSAN – Objective 2.2 – Describe vSAN Requirements - thecloudxpert
- Nexenta Announces NexentaCloud | penguinpunk.net
- DBeaver is an SQL client and a database administration tool - Free Alternative to SQL Server Management Studio | ESX Virtualization
- White-Label Backup Solution as a part of MSP Offering
- Amazon S3 Storage Classes Explained
- Managed Service Provider Pricing: Basic Guide on MSP Pricing Models
- Best Backup Software in 2018 | G2 Crowd
- What is SAP S/4HANA? – Business Introduction
- SAP S/4HANA
- The Many Hats Club: Color Doesn't Matter
- 20 Critical Security Controls: Control 11 - Secure Configuration for Network Devices
- Physician, protect thyself: An ounce of prevention is worth a pound of cure - Security Boulevard
- Nine Selves and the Hero’s Journey – Michael O. Church
- How to improve your code using SonarQube
- DSHR's Blog: Flash vs. Disk (Again)
- Tofugu — A Japanese Culture & Language Blog
- How Long Does It Take To Recover From vSAN Drive or Node Failures? — ThinkCharles.net
- Metrics, Measurement, and Information Security -
- SamSam Ransomware: How to Identify and Mitigate the Risk - Blog | Tenable™
- How to prepare for a security audit | Trail of Bits Blog
- GRUB Recovery for UEFI/GPT/LUKS/LVM · The Hacking Memento
- GoScanSSH Malware spread avoiding Government and Military networksSecurity Affairs
- IPFS is the Distributed Web
- Securing the Corporate WLAN in a Healthcare Regulated Organization - securing-corporate-wlan-healthcare-regulated-organization-38370
- Top 6 steps for GDPR compliance
- InfoSec Handlers Diary Blog - How are Your Vulnerabilities?
- NBlog - the NoticeBored blog: NBlog April 4 - 7 top tips on documentation
- Announcing: new British Standard for cyber risk and resilience – Microsoft Secure
- MalwareJake: Atlanta government was compromised in April 2017 - well before last week's ransomware attack
- 7 common flaws that keep security managers up at night
- 7 points CEOs need to know about Spectre and Meltdown
- Envizon - Network Visualization Tool With Focus On Red / Blue Team Requirements - KitPloit - PenTest Tools for your Security Arsenal ☣
- Pyfiscan - Web-Application Vulnerability And Version Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- Moloch - An Open Source, Large Scale, Full Packet Capturing, Indexing, And Database System - KitPloit - PenTest Tools for your Security Arsenal ☣
- GRR Rapid Response - Remote Live Forensics For Incident Response - KitPloit - PenTest Tools for your Security Arsenal ☣
- Security Onion - Linux Distro For IDS, NSM, And Log Management - KitPloit - PenTest Tools for your Security Arsenal ☣
- The GDPR: A guide for small businesses – IT Governance Blog
- 15% of computers still run on Windows XP at NHS Lothian in Scotland – IT Governance Blog
- Employees’ lack of security awareness is “inexplicable and inexcusable” – IT Governance Blog
- Simplify your risk assessments – IT Governance Blog
- How to write an ISO 22301-compliant business continuity plan – with example template – IT Governance Blog
- Data Security and Protection (DSP) Toolkit launched for health and social care – IT Governance Blog
- GDPR compliance for professional services firms: time to get on track – IT Governance Blog
- 7 principles of the PRINCE2 project management method – IT Governance Blog
- ISO 27001: How to set and document your information security objectives – IT Governance Blog
- Why you should know about SSL certificates: CertDB.com Case
- 10 Alarming Cyber Security Facts that Threaten Your Data [Updated]
- 10+ Critical Corporate Cyber Security Risks – A Data Driven List [Update 2018]
- Why Is Shadow IT So Common in Healthcare? - HealthcareInfoSecurity
- Should HHS Offer Incentives for Cybersecurity Frameworks?
- Full Disk Encryption on Linux – Exotic Security
- Using Piwik Analytics – Exotic Security
- What exactly is encrypted with Android full disk encryption?
- Setting up FreeRADIUS to secure your WiFi – Exotic Security
- KeePassX
- Is patching still the best defence – Exotic Security
- Automatic Updates for Debian – Exotic Security
- Setting up Gogs on Debian Jessie with Apache2 and PostgreSQL – Exotic Security
- Ansible Role Rdiff-Backup Script | World Backup Day | b3n.org
- Fill Your Skills Tank - The IT Hollow
- How to Reset the ESXi Root Password
- Docker for impatient newbies part 1: Getting started – The Buttonfactory
- 20 Ways to Get The Most Out of Your Data Platform - Thomas LaRock
- IP Over InfiniBand and KVM Virtual Machines - Patshead.com Blog
- Lecture Your Sudoers - krypted.com
- Out-Default Considered Harmful! | Keith's Consulting Blog
- How to setup PFSense with the new Secure and Private CloudFlare 1.1.1.1 DNS – jasoncoltrin.com
- Errata Security: WannaCry after one year
- How to Set Up AWS CloudTrail: An Important Step in Account Security - Delta Risk
- Slideshows - Dark Reading
- 3 Security Measures That Can Actually Be Measured
- Medical Device Security Startup Launches
- Four Gas Pipeline Firms Hit in Attack on Their EDI ...
- How Security Can Bridge the Chasm with Development
- How to Build a Cybersecurity Incident Response Plan
- Supply Chain Attacks Could Pose Biggest Threat to ...
- The Definition of Security is “Without Worry"
- DevOps as the Art and Science of Deliberate Practice
- Analysis of the 2018 F5 Threat Intel Report
- 11 ways ransomware is evolving | CSO Online
- What is FedRAMP? How cloud providers can work with the U.S. government | CSO Online
- MITRE ATT&CK
- RSA Conference: CISOs' top 4 cybersecurity priorities | CSO Online
- What is a supply chain attack? Why you should be wary of third-party providers | CSO Online
- Integrating Ansible with Jenkins in a CI/CD process
- SQL Server Always Encrypted Data | CQURE Academy
- GDPR: end user data loss prevention | CSO Online
- An excellent demonstration of Cross-Site Request Forgery – Exotic Security
- Alternative Networks for this site - ZeroNet – Exotic Security
- Alternative Networks for this site - Tor – Exotic Security
- Alternative Networks for this site - I2P – Exotic Security
- Kerckhoffs's principle – Exotic Security
- Setting up mailpile on Debian 8 Jessie for remote access – Exotic Security
- Adding subject alternative name to certificate request – Exotic Security
- Riot – Riot – open team collaboration
- Home | Matrix.org
- Seting up Matrix Synapse and Riot on Debian 8 Jessie – Exotic Security
- Using ssh config to save settings and make your life easier – Exotic Security
- Chris's Wiki :: blog/sysadmin/BackupCompressionNumbers
- Storing passwords in cleartext: don't ever
- Newsboat - An RSS/Atom Feed Reader for Linux Terminals
- 12 Git tips for Git's 12th birthday | Opensource.com
- ASD's Essential Eight – Exotic Security
- How I Manage Successful Customer 360 Projects
- Upgrading a Nexus 6P from CyanogenMod 13 to LineageOS 14 – Exotic Security
- Automating Oracle Linux Installation with Kickstart - Blog dbi services
- Working with Windows File and Folder NTFS Permissions (Copy and Reset) – A Windows System Admin's Blog
- Best Free Web Application Firewalls - Add an External Security Layer - LinuxLinks
- IP Addresses in Entertainment | The Networking Nerd
- Akash Network
- Overclock Labs | Distributed Infrastructure, Simplified
- 10 Killer Tips To Speed Up Ubuntu Linux
- How to Install Ansible AWX on CentOS 7
- Is Cybersecurity Improving? - Lawfare
- Is It Legal to Publish Email Correspondence Without Permission? - Law and Daily Life
- Foolish money mistakes (and how to avoid them) ~ Get Rich Slowly
- 2 Simple Principles to Make Your Business Relationships More Profitable
- GitHub - gerbera/gerbera: UPnP Media Server for 2018 (Based on MediaTomb)
- FDA wants Facebook and Twitter to crack down on opioid sales
- 6 myths CEOs believe about security | CSO Online
- SamSam group deletes Atlanta's contact portal after the address goes public | CSO Online
- How to configure multiple websites with Apache web server | Opensource.com
- Jaffar's (Mr RAC) Oracle blog: Backup2Cloud - a backup/restore automation utility
- How reimaging detects the ODA hardware? - Blog dbi services
- 12 Best Operating Systems For Ethical Hacking And Penetration Testing | 2018 Edition
- Install SquidGuard with Squid proxy server : Complete guide - LinuxTechLab
- How to Benchmark Your System (CPU, File IO, MySQL) with Sysbench
- FOSS Project Spotlight: CloudMapper, an AWS Visualization Tool | Linux Journal
- Apple now lets you access medical records in Health app
- A simple (but effective) investment strategy ~ Get Rich Slowly
- Dinnertime: Which Meals Offers The Most Nutrition Per Dollar? — My Money Blog
- Epic Fail: Microsoft's Windows 7 Meltdown Fix Made Your PC More Insecure
- How to programmatically set-up a (HTTP) proxy for a Selenium test | Adventures in the programming jungle
- The hidden (and not so hidden) costs of a ransomware attack | CSO Online
- Setting Up Full Disk Encryption on Debian 9 Stretch – Exotic Security
- Installing OpenCanary on a Raspberry Pi – Exotic Security
- Upgrading vSphere 5.5 before End of General Support – The Wifi-Cable
- Benefits of Cloud Storage: Cloud Backup Cost, Data Availability and More
- Happy 25th birthday Red Hat Linux! | ZDNet
- 9 Ways to Vet Your New Employer
- BranchScope: Your Intel CPUs Are Vulnerable To New Spectre-Like Attack
- Manage your workstation with Ansible: Automating configuration | Opensource.com
- How to create an open source stack using EFK | Opensource.com
- Elasticsearch, Fluentd, and Kibana (EFK)
- Get money: Live the life you want, not just the life you can afford
- Attending AWSome Day #AWSomeDay #AWS @AWS_UKI @AWScloud – vMusketeers
- Teaching ‘Cybersecurity Law and Policy’ - Lawfare
- IETF Approves TLS 1.3 as Internet Standard
- Dunning-Kruger in IT Infrastructure « ipSpace.net by @ioshints
- 5 Minute FOSS: Spinning a custom Linux distribution | Linux Journal
- Reuse before buy before build – Exotic Security
- OWASP OWTF
- "WannaCry" ransomware attack losses could reach $4 billion - CBS News
- Setting up Backblaze for Duplicati – Exotic Security
- Hang Gliding Over Hell, 3 drives die in a 6 drive NAS – Exotic Security
- Jaffar's (Mr RAC) Oracle blog: Oracle Cloud - Database Services
- Jaffar's (Mr RAC) Oracle blog: Tricky Oracle data guard situation
- Jaffar's (Mr RAC) Oracle blog: Benefits from Oracle Backup to could service
- IT Value: Using the Web to Divide Your Organizations for Effective Resource Management | CIO
- A Breakdown of Utility Computing | CIO
- Ransomware Damage Costs $5 Billion in 2017, Up from $350 Million in 2015Cybersecurity Ventures
- General Data Protection Regulation
- GitHub - redhat-performance/quads: Automated future scheduling, documentation, end-to-end provisioning and assignment of servers and networks.
- BSI Kitemark | BSI Group
- FY17 NDAA Bill Summary.pdf
- Cybersecurity experts: Device makers have “duty to keep users safe” from hacking | Imperial News | Imperial College London
- BeyondCorp A New Approach to Enterprise Security
- Hippocratic Oath for Connected Medical Devices | i am the cavalry
- Draft NISTIR 8200, Interagency Report on Status of International Cybersecurity Standardization for the Internet of Things (IoT) - nistir8200-draft.pdf
- Tech Networking in Asheville NC and Western North Carolina
- GitHub - R0GGER/docker-wsusoffline: Using a Docker container for WSUS Offline Update...
- Leader in Third-Party Remote Access | Third-Party Remote Support | SecureLink
- BeyondCorp | Run Zero Trust Security Like Google
- Database Authentication with a Smart Card – Part 1 | Late Night Oracle Blog
- FOSSA - Effortlessly comply with open source licenses
- Linux mkfifo Command Tutorial for Beginners (with Examples)
- ddgr - A Command Line Tool To Search DuckDuckGo From The Terminal | 2daygeek.com
- ddgr
- Digitizing VHS with Fedora | Opensource.com
- 8 Ways to Maintain a Clean, Lean Ubuntu Machine - Make Tech Easier
- Huawei – Probably Not What You Expected | penguinpunk.net
- Atlanta officials still 'working around the clock' to resolve ransomware attack | CSO Online
- Shenzhen's Homegrown Cyborg - Motherboard
- GitHub - cldrn/rainmap-lite: Rainmap Lite - Responsive web based interface that allows users to launch Nmap scans from their mobiles/tablets/web browsers!
- Windows Server release information | Microsoft Docs
- Windows Client and Server in 2018 – Stick To The Script
- Every Business Needs to Prioritize Security - common denial
- Defining Computer Security Incident Response Teams | US-CERT
- CERTs, CSIRTs and SOCs after 10 years from definitions - Security Boulevard
- 4 Tips for Managing an Employee with Addiction
- My life philosophy: 49 things I've learned during 49 years on Earth
- Teamwork: Embracing new culture of work – The Art of Possible
- Going paperless with Tesseract OCR
- Hackaday Visits World’s Oldest Computer Festival: TCF 43 | Hackaday
- How to download files with Powershell - Thomas Maurer
- TCF
- Tracking ransomware end-to-end | the morning paper
- How to Save on Storage cost and security using AWS - ITSMDaily.com
- Infosecurity.US - Web Log - Our Strategy...
- Technological Unemployment: Yes, It’s Our Problem Too – Michael O. Church
- 8 Easy Ways to set your Desktop up for a Distraction-Free Software Demo
- Virtual data protection officer service helps UK businesses with GDPR compliance [Q&A]
- Tackling a Fear Of Public Speaking
- Automating DataDog with Terraform
- Windows Metric Dashboards with InfluxDB and Grafana
- 5 Tips for Writing DSC Resources in PowerShell 5
- Ultimate PowerShell Prompt Customization and Git Setup Guide
- Testing Ansible Roles Against Windows with Test-Kitchen
- Slow Transfer, Packet Losses, Congestion Avoidance, Shaping and Policing (by Phil Storey)
- City of Atlanta paralyzed by a ransomware attack, is it SAMSAM?Security Affairs
- What Does the GDPR Consider to be a Data Breach?
- Computer Forensics: Chain of Custody
- SANNY Malware Delivery Method Updated in Recently Observed Attacks - Security Boulevard
- Beware the fake Facebook sirens that flirt you into sextortion – Naked Security
- ODIN - Tool For Automating Penetration Testing Tasks - KitPloit - PenTest Tools for your Security Arsenal ☣
- PyRexecd - Standalone SSH Server For Windows - KitPloit - PenTest Tools for your Security Arsenal ☣
- Cyber attacks: What to prepare for – IT Governance Blog
- How ITIL can help your cyber security career – IT Governance Blog
- How ISO 27001 and ISO 22301 can help keep your organisation secure – IT Governance Blog
- vSAN Benchmarking on Consumer Grade Kit — ThinkCharles.net
- Removing Inaccessible Objects in vSAN — ThinkCharles.net
- A Look At The Relative Spectre/Meltdown Mitigation Costs On Windows vs. Linux - Phoronix
- Setting up a safe development environment in Linux · gsilvapt dot me
- Healthcare Exchange Standards: Privacy is not dead, but does need reinforcement
- 4 Ways Every Employee Can Play a Role in Their Company’s Security
- Hybrid cloud security: Emerging lessons | The Enterprisers Project
- Create VLAN bridge under Linux (trunk, IEEE 802.1Q) | panticz.de
- A system administrator's guide to getting started with Ansible - FAST!
- Is Patching And Tech Support Bad? A Response | The Networking Nerd
- vMotion with 40GbE NIC – virtual graveyard
- The Linux Journal NSA Weekend Reading List: Tails and Tor | Linux Journal
- Doc Searls Weblog · Facebook’s Cambridge Analytica problems are nothing compared to what’s coming for all of online publishing
- France's Cyberdefense Strategic Review and International Law - Lawfare
- United States Cyber Command’s New Vision: What It Entails and Why It Matters - Lawfare
- Dell EMC and VMware – Better Together for Service Providers - VMware Telco NFV Blog - VMware Blogs
- mastodon.social - Mastodon
- VMware ESXi and ESXTOP "P" Key is New in vSphere 6.5 - Did you know? | ESX Virtualization
- Surviving 63 Drives Failure on vSAN — ThinkCharles.net
- NSX-v 6.3 - Load Balancing capabilities + confi... |VMware Communities
- 25 Low-Cost Foods Packed With Nutrition
- Advice for a young adult learning to manage money ~ Get Rich Slowly
- New R2D2 Technique Protects Files Against Wiper Malware
- An accessible overview of Meltdown and Spectre, Part 2 - Security Boulevard
- Cloud Backup for Small Business: 3 Misconceptions SMBs Have About Cloud
- Study: Malware counts higher on computers whose users visited piracy sites
- Government ‘should have done more’ to prepare organisations for the GDPR – IT Governance Blog
- 80% of organisations affected by cyber security skills gap – IT Governance Blog
- On purpose and by necessity: compliance under the GDPR | the morning paper
- Three years of the Right To Be Forgotten | the morning paper
- 10 Vital Features You Should Know About Your Windows PC
- 10 Basic Encryption Terms Everyone Should Know and Understand
- Lack of investment in security training adds to skills gap
- Google Beefs Up Cloud Security and Data Privacy Tools | News & Opinion | PCMag.com
- White House pushing for research carveout in GDPR
- Why is the CISO Role the Most Difficult Job in the World?Webinar.
- Digital Advertising Consent
- Oath Takes Aggressive Steps Outlining GDPR Compliance 03/22/2018
- Is MLAG an Alternative to Stackable Switches? « ipSpace.net by @ioshints
- Suplemon - A Powerful Console Text Editor with Multi Cursor Support
- Practical Security Principles
- The Reason Software Remains Insecure
- The Two Kinds of Privacy Loss
- Mitigating Personal Cyber Risk | CSO Online
- How Programming Affects Your Brain: 3 Big Truths According to Science
- How to Decide If You Need the New Raspberry Pi 3 B+ Model
- Wireshark, an Open-Source Forensic Tool
- Opening RDP sessions from KeePass
- CRISC Domain 2: IT Risk Assessment
- Why it’s a bad idea to break the rules, even if it’s for a good cause - 80,000 Hours
- Use Ansible to patch your system and install applications | Opensource.com
- A Guide to Preventing Common Security Misconfigurations
- CASP Domain 4: Integration of Computing, Communications, and Business Disciplines
- 8 Podcasts About Crypto for Future Bitcoin Millionaires
- Threat Horizon 2020: Foundations Start To Shake - Information Security Forum
- 10 efficient tools every marketing team needs in 2018
- ToolsWatch.org – The Hackers Arsenal Tools Portal » T.rex_scan v0.2 – Integrate Tools to Audit Web Sites
- Critical Security Controls v7 RELEASED - Security Boulevard
- Yoda - The Command line Personal Assistant For Your Linux System - OSTechNix
- WPSeku v0.4 - Wordpress Security Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- Cybersecurity Spring Cleaning: 3 Must-Dos for 2018 ...
- Zerto – What it is and why you need it | JonKensy.com
- Case Study: Scaling Your Data Scientist
- Your servers are replicated? Your backups should be, too » NetWorker Information Hub
- SOC in Translation: 4 Common Phrases & Why They ...
- Western Digital – The A Is For Active, The S Is For Scale | penguinpunk.net
- 7 Types of People Who Will Help Grow Your Career
- Evil Tester: Automated Execution for Acceptance Testing - Java JUnit FizzBuzz
- AMD vows to fix newly-disclosed processor vulnerabilities
- Moro - A Command Line Productivity Tool For Tracking Work Hours - OSTechNix
- 7 Spectre/Meltdown Symptoms That Might Be Under ...
- Codev2:Lawrence Lessig
- (My) OWASP Belgium Chapter meeting notes | Adventures in the programming jungle
- redhat event Ansible Automates Zurich - Blog dbi services
- The Cambridge Analytica-Facebook Debacle: A Legal Primer - Lawfare
- NBlog - the NoticeBored blog: NBlog March 20 - a critique of CIS netsec metrics
- Python BeautifulSoup Tutorial For Beginners | Linux Hint
- Taipan - Web Application Security Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- Lessons the world took from ITIL | The IT Skeptic
- ISO 27001 and the GDPR
- Do IT Pros Consider Security When Purchasing Software? - Security Boulevard
- CIS Releases Revised Top 20 Critical Security Controls
- CUDA is Like Owning a Supercomputer | Hackaday
- A Data Protection Officer's Guide to the GDPR Galaxy
- Insider threat examples: 7 insiders who breached security | CSO Online
- How to Encrypt Files From Within a File Manager | Linux.com | The source for Linux information
- ACUS_Intel_MedicalDevices.pdf
- CSR - ScottErvenMedicalDeviceSecurity.pdf
- Underwriters Labs refuses to share new IoT cybersecurity standard | Ars Technica
- Talks | i am the cavalry
- It's Insanely Easy to Hack Hospital Equipment | WIRED
- SNMP Lab Setup and Penetration Testing
- Errata: Steve Gibson
- Enterprise NAS Data Migration and Replication Solutions | Datadobi
- Vint Cerf and Bob Kahn, co-inventors of TCP/IP protocol | FierceTelecom
- GitHub - vincentcox/StaCoAn: StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
- Network issues with Updates KB4088875 / KB4088878 | Born's Tech and Windows World
- Security-announce Info Page
- OIG: HHS Improves Security, Yet Flaws Remain - HealthcareInfoSecurity
- Weekly Cyber Risk Roundup: Russia Sanctions, Mossack Fonseca Shutdown, Equifax Insider Trading - Security Boulevard
- Chris's Wiki :: blog/solaris/ZFSPoolRecoveryComing
- Oracle Ravello Blogger Day 2018 (aka #RBD2) | Michelle Laverick...
- Seth's Blog: When well-meaning people can't see it the same way
- Magical Thinking in Internet Security
- A Tale of Two Phases and Tech Inertia | Hackaday
- What?s It Take To Be Tomorrow?s CISO? - Security Boulevard
- Top 10 articles every SAP BASIS admin must read
- Steps to Become CISSP (Certified Information Systems Security Professional)
- Cybersecurity Evolution and its Importance in the Digital Age - Security Boulevard
- More Free/Open Source Computer Forensics Tools
- Are You Compliant with NIST 800-171? - Security Boulevard
- 9 Cyber Security Tips SMBs Can Implement Now - Delta Risk
- CASP Domain 3: Research and Analysis
- CASP Domain 2: Risk Management and Incident Response
- CASP Domain 1: Enterprise Security
- Harden your JBoss EAP 7.1 Deployments with the Java Security Manager - Red Hat Customer Portal
- Microsoft Security Intelligence Report volume 23 is now available – Microsoft Secure
- Security: 17 Things | Linux Journal
- 3 best practices for securing Kubernetes environments | Opensource.com
- Getting to know your company’s risk appetite | CSO Online
- The CLOUD Act Doesn’t Help Privacy and Human Rights: It Hurts Them - Lawfare
- GitHub - initstring/linkedin2username: OSINT Tool: Generate username lists for companies on LinkedIn
- GitHub - rezasp/joomscan: OWASP Joomla Vulnerability Scanner Project
- SpiderFoot
- 5 reasons why law firms should adopt ISO 27001 – IT Governance Blog
- Failing to patch vulnerabilities now will lead to punishment under the GDPR – IT Governance Blog
- Get involved in Shaping the Future of the Internet (by Nalini Elkins)
- GDPR Violations Are Hiding In Your Database - Here's How To Find Them - Thomas LaRock
- We Need To Talk About Dashboards - Thomas LaRock
- (ISC)2 Report: Glaring Disparity in Diversity for ...
- Oracle Ravello Blogger Day 2 (#RBD2) – Part 2 – Ather Beg’s Useful Thoughts
- Oracle Ravello Blogger Day 2 (#RBD2) – Part 1 – Ather Beg’s Useful Thoughts
- 3 ESXi Backup Methods using the Command-Line
- FAI.me - build you own customized installation image
- Chris's Wiki :: blog/linux/NfsiotopDesire
- How to take back control of /etc/resolv.conf on Linux – Ctrl blog
- MSRC security guidance: the dashboard | >_
- Oracle Patches Spectre for Red Hat | Linux Journal
- Infection Monkey
- How to Overclock Your AMD GPU with AMDGPU on Linux - Make Tech Easier
- Woke to IT Age Discrimination - The IT Hollow
- Terence Luk: Monitoring Microsoft Exchange Server 2010, 2013 and 2016 services with PowerShell script and task scheduler
- Emerging Technologies and VeriSM | Purple Griffon
- The SQL Server Tiger Team Bookmarks - Thomas LaRock
- Intel Spectre/Meltdown Microcode Updates (March 11, 2018) | Born's Tech and Windows World
- MSRC security guidance: about release notes | >_
- Databases need to be patched to a minimum before April 2019
- GRV - A Tool for Viewing Git Repositories in Linux Terminal
- Oracle Linux vs RedHat | Linux Hint
- Cli.Fyi – A Tool To Quickly Retrieve Useful Information | 2daygeek.com
- HIPAA Guidelines & Cloud Service Providers - Security Boulevard
- XKCD, Generations - Security Boulevard
- An Overview of the CCSP Domains
- The Ultimate Guide to CCSP Certification
- Evolving to Security Decision Support: Laying the Foundation - Security Boulevard
- How to Prepare for the Future of Healthcare Digital Security - Security Boulevard
- March Updates on Frameworks & Standards - Security Boulevard
- The Top Five SOC 2 Compliance Questions Answered - Security Boulevard
- What the Next Era of Cloud Computing Means for AppSec & the SDLC - Security Boulevard
- Virginia Commonwealth University Enrolls WhiteHat Security and its Application Security Platform to be the Foundation of its Application Vulnerability Management Program - Security Boulevard
- Army History, No. 106, Winter 2018 - AH106(W).pdf
- 2018 Cyberthreat Defense Report: Where IT Security Is Going - Security Boulevard
- From my Gartner Blog - The Virtual Patch Analyst - Security Boulevard
- Shifting Gears to Cloud-Centric Cybersecurity - Security Boulevard
- What is a vulnerability management program? - The Silicon Underground
- VMRay Analyzer: Rapid Malware Analysis for Incident Response (IR) Teams - vmray-analyzer-rapid-malware-analysis-incident-response-ir-teams-38325
- Learn More about the 2018 PMP Exam Change | Tech Roots
- Measure Security Performance, Not Policy Compliance - Security Boulevard
- Who Cares About Cybersecurity? - Lawfare
- Comparing Plans | Oracle Scratchpad
- How To Quickly Monitor Multiple Hosts In Linux - OSTechNix
- HIMSS18: Cybersecurity Takeaways - HealthcareInfoSecurity
- GitHub - facebook/zstd: Zstandard - Fast real-time compression algorithm
- UTOUG Training Days 2018 in Salt Lake City
- NextGen SIEM Isn’t SIEM - Security Boulevard
- NBlog - the NoticeBored blog: NBlog March 8 - brainstorming awareness ideas
- What’s new for the Command Line in Windows 10 version 1803 – Windows Command Line Tools For Developers
- CredsLeaker - Tool to Display A Powershell Credentials Box - KitPloit - PenTest Tools for your Security Arsenal ☣
- Ride The Lightning: Large Law Firms Seeing More Data Breaches
- Physical Data Center Security – Make it better
- sub6 - Web App Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- The cost of a cyber attack – IT Governance Blog
- Home Depot in $27.84 million California hazardous waste, privacy settlement
- Patching Your Software Alone Is A Hassle. Not Patching Is A Risk
- Your IT shop is Ugly! Part 3 | Virtual Me
- Your IT shop is Ugly! Part 2 | Virtual Me
- Your IT shop is Ugly! Part 1 | Virtual Me
- Updated Oracle Roadmap Points To Post-11.4 Solaris Release Around 2020 - Phoronix
- vSAN Online Health checks: New KBs now available - Virtual Blocks
- vSAN Online Health checks: New KBs now available - Virtual Blocks
- Rubrik Automated IT Helpdesk Ticketing v1 – Virtually Sober
- Intel X710 NICs Are Crap - The Lone Sysadmin
- Essential RHCE/RHCSA Study Guides – Codingbee
- Nobody is an expert at Oracle Database 18c | The ORACLE-BASE Blog
- Get IAM roles,policies and users-AWS CLI | geekdudes
- Make Your Program Slower With Threads - Marc's Blog
- Two traps in iostat: %util and svctm - Marc's Blog
- Beyond iostat: Storage performance analysis with blktrace - Marc's Blog
- Latency lags bandwidth - Marc's Blog
- A layered approach to backups | Scott Gruby's Blog
- PowerCLI - VM and Host Metrics To Elasticsearch - EverythingShouldBeVirtual
- Ansible for Extreme Devices · Lindsay Hill
- Network Janitor | The Smartest Guy in the Room
- How to Setup iSCSI Server (Target) and Client (Initiator) on Debian 9
- Deeper Dive—Are the 3 major DRAM producers gaming the market? | FierceCable
- sigma - Generic Signature Format for SIEM Systems - KitPloit - PenTest Tools for your Security Arsenal ☣
- How to write a GDPR privacy notice – with documentation template example – IT Governance Blog
- Equifax facing historic data breach costs
- GDPR - Three Things You Can Do Now to Prepare
- Link Layer Discovery Protocol (LLDP): How it Works and Configuration
- vRetreat 2018: Zerto Virtual Replication 6.0 – Ather Beg’s Useful Thoughts
- Errata Security: Some notes on memcached DDoS